• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
warning: expiring root certificate may disable firefox add ons, security features,

WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback

You are here: Home / General Cyber Security News / WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback
March 13, 2025

Browser maker Mozilla is urging users to update their Firefox instances to the latest version to avoid facing issues with using add-ons due to the impending expiration of a root certificate.

“On March 14, 2025, a root certificate used to verify signed content and add-ons for various Mozilla projects, including Firefox, will expire,” Mozilla said.

Cybersecurity

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Without updating to Firefox version 128 or higher (or ESR 115.13+ for ESR users, including Windows 7/8/8.1 and macOS 10.12-10.14 users), this expiration may cause significant issues with add-ons, content signing and DRM-protected media playback.”

Mozilla said the latest version of Firefox includes a new root certificate that will prevent this from happening. The update is crucial for all users of Firefox running a version prior to 128, or Extended Support Release (ESR) versions before 115.13, both of which were released on July 9, 2024. This includes all versions of Firefox for Windows, macOS, Linux, and Android.

Root certificates are designed to identify a root certificate authority (CA), a trusted entity that ensures the authenticity of websites, add-ons and software updates. In this case, the certificate is used to verify that a browser add-on was approved by Mozilla.

Should the digital certificate expire, systems that rely on the certificate can no longer meet authenticity and integrity guarantees, causing certain features like add-ons, alerts about breached passwords, or secure media playback to stop working.

In the event the update is not applied before the deadline, it also risks causing the blocklists used for flagging harmful add-ons and revocation lists for recognizing untrusted SSL certificates and preloaded intermediate certificates to go out-of-date, putting users at risk of more threats.

Cybersecurity

“While it’s possible to use Firefox without updating, you may experience problems such as add-ons being disabled, DRM media difficulties and other interruptions,” it added. “Skipping the update also means missing important security fixes and performance improvements.”

Users are highly advised to check and confirm they’re running Firefox version 128 and later by navigating to Menu > Settings > About Firefox. It’s worth noting that iOS and iPad users are unaffected. Given that the Tor Browser is a modified version of Firefox ESR, it’s essential that users update their installations as well.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «chinese hackers breach juniper networks routers with custom backdoors and Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits
Next Post: Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk meta warns of freetype vulnerability (cve 2025 27363) with active exploitation risk»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.