🕳️ Vulnerabilities & CVEs

Firefox's Secret Handshake: How a Tiny Glitch Unmasked Tor Users

Imagine walking into a party, shedding your coat and hat, and thinking you're invisible. Then, someone whispers your favorite childhood nickname. That's essentially what happened to Firefox users.

Abstract digital fingerprint graphic overlaying a browser window

⚡ Key Takeaways

  • A Firefox vulnerability (CVE-2026-6770) allowed for user fingerprinting by exploiting the stable ordering of IndexedDB databases. 𝕏
  • The flaw impacted Firefox Private Browsing and Tor Browser's 'New Identity' feature, linking sessions that were meant to be isolated. 𝕏
  • Mozilla has patched the vulnerability in Firefox 150, and the Tor Project has applied the fix in Tor Browser 15.0.10. 𝕏
Published by

CVE Watch

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by SecurityWeek

Stay in the loop

The week's most important stories from CVE Watch, delivered once a week.