{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T18:33:07.228","vulnerabilities":[{"cve":{"id":"CVE-2020-26964","sourceIdentifier":"security@mozilla.org","published":"2020-12-09T01:15:13.473","lastModified":"2024-11-21T05:20:35.453","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83."},{"lang":"es","value":"Si la funcionalidad Remote Debugging via USB estaba habilitada en Firefox para Android en una versión de Android anterior a Android 6.0, las aplicaciones no confiables podrían haberse conectado a la funcionalidad y operar con los privilegios del navegador para leer e interactuar con el contenido web.&#xa0;La funcionalidad fue implementada como un socket de dominio Unix, protegido por la política SELinux de Android;&#xa0;sin embargo, SELinux no se aplicó para versiones anteriores a 6.0.&#xa0;Esto se corrigió al eliminar la funcionalidad Remote Debugging via USB de los dispositivos afectados.&#xa0;*Nota: este problema solo afectó a Firefox para Android.&#xa0;Otros sistemas operativos no están afectados.*.&#xa0;Esta vulnerabilidad afecta a Firefox versiones anteriores a 83"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*","versionEndExcluding":"83.0","matchCriteriaId":"67674351-4402-4E4E-93F3-E307474911F5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","versionEndExcluding":"6.0","matchCriteriaId":"315202A7-8CE2-43E0-A2E0-D78FB53C851D"}]}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1658865","source":"security@mozilla.org","tags":["Issue Tracking","Permissions Required","Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2020-50/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1658865","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Permissions Required","Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2020-50/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}