{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-8028","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","state":"PUBLISHED","assignerShortName":"mozilla","dateReserved":"2025-07-22T10:13:49.236Z","datePublished":"2025-07-22T20:49:24.592Z","dateUpdated":"2026-04-13T14:26:48.394Z"},"containers":{"cna":{"affected":[{"product":"Firefox","vendor":"Mozilla","versions":[{"status":"unaffected","version":"115.26","lessThanOrEqual":"115.*","versionType":"rpm"},{"status":"unaffected","version":"128.13","lessThanOrEqual":"128.*","versionType":"rpm"},{"status":"unaffected","version":"140.1","lessThanOrEqual":"140.*","versionType":"rpm"},{"status":"unaffected","version":"141","lessThanOrEqual":"*","versionType":"rpm"}]},{"product":"Thunderbird","vendor":"Mozilla","versions":[{"status":"unaffected","version":"128.13","lessThanOrEqual":"128.*","versionType":"rpm"},{"status":"unaffected","version":"140.1","lessThanOrEqual":"140.*","versionType":"rpm"},{"status":"unaffected","version":"141","lessThanOrEqual":"*","versionType":"rpm"}]}],"descriptions":[{"lang":"en","value":"On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.","supportingMedia":[{"type":"text/html","base64":false,"value":"On arm64, a WASM <code>br_table</code> instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1."}]}],"title":"Large branch table could lead to truncated instruction","references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1971581"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-56/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-57/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-58/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-59/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-61/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-62/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-63/"}],"credits":[{"lang":"en","value":"Gary Kwong"}],"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2026-04-13T14:26:48.394Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1332","lang":"en","description":"CWE-1332 Improper Handling of Faults that Lead to Instruction Skips"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-07-23T14:32:07.056857Z","id":"CVE-2025-8028","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-04T15:58:24.124Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00016.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:07:45.506Z"}}]}}