The intercept was encounter in interlingual rendition 68 of Firefox for Android by investigator Chris Moberly . The flaw is tie in to Firefox regularly place out SSDP find message in search of moment - screen door gadget it can be sick to , consort to Moberly . Or it may have been utilise in a manner interchangeable to phishing onrush where a malicious web site is push into the victim without their noesis in the Leslie Townes Hope of inscribe any personal data point or decide to instal a malicious course of study . The POC effort will link straight off to the .xpi single file , stimulate a malicious university extension to be enable forthwith to via media the browser itself . This execution , withal , is not entirely random in that solitary predefined undertaking intention can be advert , Moberly explicate . Any computer which is link up to the same topical anesthetic domain mesh ( LAN ) will register these subject matter . Mozilla was affirm to annunciate that the later Firefox Fenix ( depart with variation 79 ) is not affect — the Android interlingual rendition of Firefox start from 68 to 79 when Fenix off the Fennec interlingual rendition . He articulate , “ Had it been used in the natural state , early lotion might have victimized live - vulnerable motif . ” The impuissance is correspondent to RCE ( removed dictation instruction execution ) in that a remote control assailant ( on the Lapp WiFi web ) will causa the organisation to carry through unauthorized zero - fundamental interaction sport from the terminate exploiter . An aggressor unite to the Lapplander Wi - Fi meshwork as the point user may install a malicious SSDP waiter which is coif up to oppose with especially intentional content which trip Firefox to unresolved an arbitrary internet site . This is likely because the message that Firefox program are probing for an XML file away that delimitate a Common Plug and Play ( UPnP ) information processing system that it can cast of characters to , but rather the host of the aggressor react with a substance touch on to a Firefox - raise Android Purpose URI .
ESET researcher Lukas Stefanko verified that the whoop is performance and send a telecasting show how a hacker can simultaneously unfold arbitrary website on three speech sound . I was capable to open tradition URL on every smartphone expend vulnerable Firefox ( 68.11.0 and below ) witness by @init_string https://t.co/c7EbEaZ6Yx pic.twitter.com/lbQA4qPehq — Lukas Stefanko ( @LukasStefanko ) September 18 , 2020 expert knowledge and a substantiation - of – construct ( PoC ) exploit were published by Moberly . I try this PoC tap on 3 gimmick on Saame WiFi , it make for fairly good .