Mozilla Uses AI to Patch 423 Firefox Zero‑Days in One Month

Overview Mozilla has achieved a record‑breaking security milestone, fixing 423 Firefox vulnerabilities in April 2026 — nearly 20 times its monthly average. The surge was driven by a new agentic AI pipeline built around Anthropic’s Claude Mythos Preview and other large language models, which identified 271 of the bugs.

Key Highlights

  • AI Discovery: Claude Mythos Preview uncovered 271 vulnerabilities, shipped in Firefox 150 (April 21, 2026).
    • 180 rated sec‑high.
    • 80 rated sec‑moderate.
    • 11 rated sec‑low.
  • Other Sources:
    • 41 externally reported bugs.
    • 111 found via internal techniques, other AI models, and fuzzing.
  • Anthropic Frontier Red Team: Credited with three CVEs — CVE‑2026‑6746, CVE‑2026‑6757, CVE‑2026‑6758.

Representative Vulnerabilities

Mozilla disclosed 12 bug reports to showcase AI’s depth:

  • Bug 2024437: 15‑year‑old <legend> HTML UAF via recursion edge cases.
  • Bug 2025977: 20‑year‑old XSLT reentrant key() hash table UAF.
  • Bug 2021894: IPC race → IndexedDB UAF → sandbox escape.
  • Bug 2022034: NaN masquerading as JS pointer across IPC boundary.
  • Bug 2026305: rowspan=0 HTML table bitfield overflow.
  • Bug 2029813: RLBox sandbox escape via verification gap.

These sandbox escape primitives are notoriously difficult to surface with traditional fuzzing, highlighting AI’s unique value.

How the AI Pipeline Works

  • Agentic Harness: Models generate bug hypotheses and reproducible PoCs, eliminating false positives.
  • Integration: Built atop Mozilla’s fuzzing infrastructure, parallelized across ephemeral VMs.
  • Lifecycle Coverage: Deduplication, triage, patch tracking, and release management.
  • Operational Scale: Over 100 contributors reviewed, tested, and shipped patches.

Strategic Impact

  • Defense Validation: AI attempts to exploit prototype pollution were blocked by Mozilla’s earlier decision to freeze JS prototypes — proving defense‑in‑depth works.
  • Future Plans: Mozilla will integrate AI scanning into CI pipelines, extending coverage from file‑based to patch‑based analysis.
  • Guidance: Any software project can adopt agentic harnesses today, starting with simple prompts and iterating for effectiveness.

Final Thought

Mozilla’s April 2026 patch cycle demonstrates how AI is transforming vulnerability discovery. By combining LLMs with reproducible test harnesses, Mozilla surfaced decades‑old bugs and sandbox escape primitives that fuzzers missed. The lesson is clear: AI isn’t just augmenting security — it’s redefining the scale and speed of vulnerability management.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.