• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
tails os users advised not to use tor browser until

Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched

You are here: Home / General Cyber Security News / Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched
May 26, 2022

The maintainers of the Tails undertaking have issued a warning that the Tor Browser which is bundled with the running system is unsafe to use for accessing or entering sensitive facts.

“We suggest that you stop using Tails right up until the release of 5.1 (Could 31) if you use Tor Browser for delicate information (passwords, personal messages, personal information, and many others.),” the job stated in an advisory issued this week.

Tails, short for The Amnesic Incognito Reside Procedure, is a security-oriented Debian-based Linux distribution aimed at preserving privacy and anonymity by connecting to the internet as a result of the Tor network.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

The notify comes as Mozilla on May perhaps 20, 2022 rolled out fixes for two critical zero-day flaws in its Firefox browser, a modified model of which functions as the foundation of the Tor Browser.

Tracked as CVE-2022-1802 and CVE-2022-1529, the two vulnerabilities are what is actually referred to as prototype pollution that could be weaponized to obtain JavaScript code execution on units working susceptible variations of Firefox, Firefox ESR, Firefox for Android, and Thunderbird.

“For instance, just after you check out a malicious website, an attacker controlling this internet site may well access the password or other delicate facts that you send out to other web sites afterwards for the duration of the exact Tails session,” the Tails advisory reads.

The bugs had been shown by Manfred Paul at the 15th version of the Pwn2Personal hacking contest held at Vancouver previous 7 days, for which the researcher was awarded $100,000.

CyberSecurity

Even so, Tor Browsers that have the “Most secure” security stage enabled as very well as the Thunderbird email consumer in the functioning system are immune to the flaws as JavaScript is disabled in both equally instances.

Also, the weaknesses will not split the anonymity and encryption protections baked into Tor Browser, that means that Tails people who never take care of sensitive info can keep on to use the web browser.

“This vulnerability will be preset in Tails 5.1 (May 31), but our workforce won’t have the capacity to publish an crisis launch earlier,” the builders stated.

Observed this article intriguing? Abide by THN on Fb, Twitter  and LinkedIn to study additional special content material we publish.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «Cyber Security News State of Cybersecurity Report 2022 Names Ransomware and Nation-State Attacks As Biggest Threats
Next Post: Google Chrome branded the least effective browser for stopping phishing attacks google chrome branded the least effective browser for stopping phishing»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.