The Wordfence security team has just announced a new zero-day vulnerability that is affecting Firefox and Tor browsers. Wordfence suggests users of these browsers temporarily switch to another browser until both teams have a fix. The zero-day vulnerability allows an attacker to execute code on your Windows based machine giving them the ability to install malware or ransomware. Here’s what Wordfence had to say about the situation early this morning.
We’re publishing this as an emergency bulletin for our customers and the larger web community. A few hours ago a zero-day vulnerability emerged in the Tor browser bundle and the Firefox web browser. Currently it exploits Windows systems with a high success rate and affects Firefox versions 41 to 50 and the current version of the Tor Browser Bundle which contains Firefox 45 ESR.
If you use Firefox, we recommend you temporarily switch browsers to Chrome, Safari or a non-firefox based browser that is secure until the Firefox dev team can release an update. The vulnerability allows an attacker to execute code on your Windows workstation. The exploit is in the wild, meaning it’s now public and every hacker on the planet has access to it. There is no fix at the time of this writing.
Currently this exploit causes a workstation report back to an IP address based at OVH in France. But this code can likely be repurposed to infect workstations with malware or ransomware. The exploit code is now public knowledge so we expect new variants of this attack to emerge rapidly.
This is a watering hole attack, meaning that a victim has to visit a website that contains this exploit code to be attacked. So our forensic team is keeping an eye on compromised WordPress websites and we expect to see this code show up on a few of them during the next few days. An attackers goal would be to compromise workstations of visitors to WordPress websites that have been hacked.
For now, you should avoid using Firefox and Tor until Wordfence has an update on the situation. You can check out their full bulletin at the link below and check back with them for updates.
Last Updated on