
CVE-2022-26486
- Reference to the description:
- Description:
- An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
- Last updated date:
- 01/28/2025
Reports

ACTIVELY EXPLOITED
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 03/05/2022
- Reference url to background
https://www.mozilla.org/en-US/security/advisories/mfsa2022-09/
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 03/07/2022
- Reference url to background
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 12/22/2022
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 12/30/2022
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 12/30/2022
- Reference url to background