Mozilla Firefox Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +27 −21
Comparison against the immediately-prior release (V4R27). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 27
- V-223151 High Installed version of Firefox unsupported.
- V-223152 Medium Firefox must be configured to allow only TLS.
- V-223153 Medium FireFox is configured to ask which certificate to present to a web site when a certificate is required.
- V-223154 Medium Firefox automatically checks for updated version of installed Search plugins.
- V-223155 Medium Firefox automatically updates installed add-ons and plugins.
- V-223156 Medium Firefox automatically executes or downloads MIME types which are not authorized for auto-download.
- V-223157 Medium Network shell protocol is enabled in FireFox.
- V-223158 Medium Firefox is not configured to prompt a user before downloading and opening required file types.
- V-223159 Medium FireFox plug-in for ActiveX controls is installed.
- V-223160 Medium Firefox formfill assistance option is disabled.
- V-223161 Medium Firefox is configured to autofill passwords.
- V-223162 Medium FireFox is configured to use a password store with or without a master password.
- V-223163 Medium FireFox is not configured to block pop-up windows.
- V-223164 Medium FireFox is configured to allow JavaScript to move or resize windows.
- V-223165 Medium Firefox is configured to allow JavaScript to raise or lower windows.
- V-223166 Medium Firefox is configured to allow JavaScript to disable or replace context menus.
- V-223167 Medium Extensions install must be disabled.
- V-223168 Medium Background submission of information to Mozilla must be disabled.
- V-223169 Low Firefox Development Tools Must Be Disabled.
- V-223170 Medium Telemetry must be disabled.
- V-223171 Medium Telemetry archive must be disabled.
- V-223172 Medium Fingerprinting protection must be enabled.
- V-223173 Medium Cryptomining protection must be enabled.
- V-223174 Medium Enhanced Tracking Protection must be enabled.
- V-223175 Medium Extension recommendations must be disabled.
- V-223177 Medium Deprecated ciphers must be disabled.
- V-223179 Medium The DOD Root Certificate is not installed.
Removed rules 21
- V-15768 Medium FireFox is configured to ask which certificate to present to a web site when a certificate is required.
- V-15770 Medium Firefox automatically executes or downloads MIME types which are not authorized for auto-download.
- V-15771 Medium Network shell protocol is enabled in FireFox.
- V-15772 Medium Firefox is not configured to prompt a user before downloading and opening required file types.
- V-15773 Medium FireFox plug-in for ActiveX controls is installed.
- V-15774 Medium Firefox formfill assistance option is disabled.
- V-15775 Medium Firefox is configured to autofill passwords.
- V-15776 Medium FireFox is configured to use a password store with or without a master password.
- V-15778 Medium FireFox is not configured to block pop-up windows.
- V-15779 Medium FireFox is configured to allow JavaScript to move or resize windows.
- V-15983 Medium Firefox must be configured to allow only TLS.
- V-15985 Medium Firefox is configured to allow JavaScript to raise or lower windows.
- V-15986 Medium Firefox is configured to allow JavaScript to disable or replace context menus.
- V-17988 High Installed version of Firefox unsupported.
- V-19742 Medium Firefox automatically updates installed add-ons and plugins.
- V-19743 Medium Firefox required security preferences cannot be changed by user.
- V-19744 Medium Firefox automatically checks for updated version of installed Search plugins.
- V-6318 Medium The DOD Root Certificate is not installed.
- V-64891 Medium Extensions install must be disabled.
- V-79053 Medium Background submission of information to Mozilla must be disabled.
- V-97529 Low Firefox Development Tools Must Be Disabled.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- DTBF003
- Vuln IDs
-
- V-223151
- V-17988
- Rule IDs
-
- SV-223151r612236_rule
- SV-19509
Checks: C-24824r531270_chk
Method 1: View the following registry key: HKLM\Software\Mozilla\Mozilla Firefox\CurrentVersion Method 2: Run Firefox. Click the ellipsis button >> Help >> About Firefox, and view the version number. Criteria: If the Firefox version is not a supported version, this is a finding.
Fix: F-24812r531271_fix
Upgrade the version of the browser to an approved version by obtaining software from the vendor or other trusted source.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- DTBF030
- Vuln IDs
-
- V-223152
- V-15983
- Rule IDs
-
- SV-223152r612236_rule
- SV-16925
Checks: C-24825r531273_chk
Open a browser window, type "about:config" in the address bar. Verify Preference Name "security.tls.version.min" is set to the value "2" and locked. Verify Preference Name "security.tls.version.max" is set to the value "4" and locked. Criteria: If the parameters are set incorrectly, this is a finding. If the settings are not locked, this is a finding.
Fix: F-24813r531274_fix
Configure the following parameters using the Mozilla.cfg file: LockPref "security.tls.version.min" is set to "2". LockPref "security.tls.version.max" is set to "4".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- DTBF050
- Vuln IDs
-
- V-223153
- V-15768
- Rule IDs
-
- SV-223153r612236_rule
- SV-16707
Checks: C-24826r531276_chk
Type "about:config" in the browser address bar. Verify Preference Name "security.default_personal_cert" is set to "Ask Every Time" and is locked to prevent the user from altering. Criteria: If the value of "security.default_personal_cert" is set incorrectly or is not locked, then this is a finding.
Fix: F-24814r531277_fix
Set the value of "security.default_personal_cert" to "Ask Every Time". Use the Mozilla.cfg file to lock the preference so users cannot change it.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF085
- Vuln IDs
-
- V-223154
- V-19744
- Rule IDs
-
- SV-223154r612236_rule
- SV-21890
Checks: C-24827r531279_chk
Type "about:config" in the browser window. Verify the preference "browser.search.update” is set to "false" and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24815r531280_fix
Ensure the preference "browser.search.update" is set and locked to the value of “False”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF090
- Vuln IDs
-
- V-223155
- V-19742
- Rule IDs
-
- SV-223155r612236_rule
- SV-59603
Checks: C-24828r531282_chk
Type "about:config" in the browser window. Verify the preference “extensions.update.enabled” is set to "false" and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If this setting is not locked, then this is a finding.
Fix: F-24816r531283_fix
Set the preference “extensions.update.enabled” value to "false" and lock using the Mozilla.cfg file.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- DTBF100
- Vuln IDs
-
- V-223156
- V-15770
- Rule IDs
-
- SV-223156r612236_rule
- SV-16709
Checks: C-24829r531285_chk
Use Method 1 or 2 to check if the following extensions are listed in the browser configuration: HTA, JSE, JS, MOCHA, SHS, VBE, VBS, SCT, WSC. By default, most of these extensions will not show up on the Firefox listing. Criteria: Method 1: In about:plugins, Installed plug-in, inspect the entries in the Suffixes column. If any of the prohibited extensions are found, then for each of them, verify that it is not associated with an application that executes code. However, applications such as Notepad.exe that do not execute code may be associated with the extension. If the extension is associated with an unauthorized application, then this is a finding. If the extension exists but is not associated with an application, then this is a finding. Method 2: Use the Options User Interface Applications menu to search for the prohibited extensions in the Content column of the table. If an extension that is not approved for automatic execution exists and the entry in the Action column is associated with an application that does not execute the code (e.g., Notepad), then do not mark this as a finding. If the entry exists and the "Action" is 'Save File' or 'Always Ask', then this is not a finding. If an extension exists and the entry in the Action column is associated with an application that does/can execute the code, then this is a finding.
Fix: F-24817r531286_fix
Remove any unauthorized extensions from the autodownload list.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF105
- Vuln IDs
-
- V-223157
- V-15771
- Rule IDs
-
- SV-223157r612236_rule
- SV-16710
Checks: C-24830r531288_chk
Procedure: Open a browser window, type "about:config" in the address bar. Criteria: If the value of "network.protocol-handler.external.shell" is not "false" or is not locked, then this is a finding.
Fix: F-24818r531289_fix
Procedure: Set the value of "network.protocol-handler.external.shell" to "false" and lock using the Mozilla.cfg file.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- DTBF110
- Vuln IDs
-
- V-223158
- V-15772
- Rule IDs
-
- SV-223158r612236_rule
- SV-16711
Checks: C-24831r531291_chk
Open a browser window, type "about:config" in the address bar. Criteria: If the “plugin.disable_full_page_plugin_for_types” value is not set to include the following external extensions and not locked, this is a finding: PDF, FDF, XFDF, LSL, LSO, LSS, IQY, RQY, XLK, XLS, XLT, POT, PPS, PPT, DOS, DOT, WKS, BAT, PS, EPS, WCH, WCM, WB1, WB3, RTF, DOC, MDB, MDE, WBK, WB1, WCH, WCM, AD, ADP.
Fix: F-24819r531292_fix
Ensure the following extensions are not automatically opened by Firefox without user confirmation. Do not use plugins and add-ons to open these files. Use the "plugin.disable_full_page_plugin_for_types" preference to set and lock the following extensions so that an external application, rather than an add-on or plugin, will not be used: PDF, FDF, XFDF, LSL, LSO, LSS, IQY, RQY, XLK, XLS, XLT, POT, PPS, PPT, DOS, DOT, WKS, BAT, PS, EPS, WCH, WCM, WB1, WB3, RTF, DOC, MDB, MDE, WBK, WB1, WCH, WCM, AD, ADP.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBF120
- Vuln IDs
-
- V-223159
- V-15773
- Rule IDs
-
- SV-223159r612236_rule
- SV-16712
Checks: C-24832r531294_chk
Open a browser window, type "about:plugins" in the address bar. Criteria: If the Mozilla ActiveX control and plugin support is present and enabled, then this is a finding.
Fix: F-24820r531295_fix
Remove/uninstall the Mozilla ActiveX plugin
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF140
- Vuln IDs
-
- V-223160
- V-15774
- Rule IDs
-
- SV-223160r612236_rule
- SV-16713
Checks: C-24833r531297_chk
Type "about:config" in the address bar, verify that the preference name “browser.formfill.enable" is set to “false” and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24821r531298_fix
Ensure the preference “browser.formfill.enable" is set and locked to the value of “false”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF150
- Vuln IDs
-
- V-223161
- V-15775
- Rule IDs
-
- SV-223161r612236_rule
- SV-16714
Checks: C-24834r531300_chk
In About:Config, verify that the preference name “signon.autofillForms“ is set to “false” and locked. Criteria: If the parameter is set incorrectly, this is a finding. If the setting is not locked, this is a finding.
Fix: F-24822r531301_fix
Ensure the preference "signon.autofillForms" is set and locked to the value of “false”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF160
- Vuln IDs
-
- V-223162
- V-15776
- Rule IDs
-
- SV-223162r612236_rule
- SV-16715
Checks: C-24835r531303_chk
Type "about:config" in the browser window. Verify that the preference name “signon.rememberSignons" is set and locked to “false”. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24823r531304_fix
Ensure the preference “signon.rememberSignons“ is set and locked to the value of “false”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF180
- Vuln IDs
-
- V-223163
- V-15778
- Rule IDs
-
- SV-223163r612236_rule
- SV-16717
Checks: C-24836r531306_chk
In About:Config, verify that the preference name “dom.disable_window_open_feature.status " is set to “true” and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24824r531307_fix
Ensure the preference "dom.disable_window_open_feature.status " is set and locked to the value of “true”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF181
- Vuln IDs
-
- V-223164
- V-15779
- Rule IDs
-
- SV-223164r612236_rule
- SV-16718
Checks: C-24837r531309_chk
In About:Config, verify that the preference name “dom.disable_window_move_resize" is set and locked to “true”. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24825r531310_fix
Ensure the preference "dom.disable_window_move_resize" is set and locked to the value of “true”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF182
- Vuln IDs
-
- V-223165
- V-15985
- Rule IDs
-
- SV-223165r612236_rule
- SV-16927
Checks: C-24838r531312_chk
In About:Config, verify that the preference name “dom.disable_window_flip" is set and locked to “true”. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24826r531313_fix
Ensure the preference "dom.disable_window_flip" is set and locked to the value of “true”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF183
- Vuln IDs
-
- V-223166
- V-15986
- Rule IDs
-
- SV-223166r612236_rule
- SV-16928
Checks: C-24839r531315_chk
Type "about:config" in the address bar of the browser. Verify that the preferences "dom.event.contextmenu.enabled" is set and locked to "false". Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, this is a finding.
Fix: F-24827r531316_fix
Ensure the preferences "dom.event.contextmenu.enabled" is set and locked to "false".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF186
- Vuln IDs
-
- V-223167
- V-64891
- Rule IDs
-
- SV-223167r612236_rule
- SV-79381
Checks: C-24840r531318_chk
Open a browser window, type "about:config" in the address bar, then navigate to the setting for Preference Name "xpinstall.enabled" and set the value to “false” and locked. Criteria: If the value of “xpinstall.enabled” is “false”, this is not a finding. If the value is locked, this is not a finding.
Fix: F-24828r531319_fix
Set the preference “xpinstall.enabled” to “false” and lock using the “mozilla.cfg” file. The “mozilla.cfg” file may need to be created if it does not already exist.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF190
- Vuln IDs
-
- V-223168
- V-79053
- Rule IDs
-
- SV-223168r612236_rule
- SV-93759
Checks: C-24841r531321_chk
Type "about:config" in the address bar of the browser. Verify that the preference "datareporting.policy.dataSubmissionEnabled" is set and locked to "false". Otherwise, this is a finding.
Fix: F-24829r531322_fix
Ensure the preferences "datareporting.policy.dataSubmissionEnabled" is set and locked to "false".
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001312
- Version
- DTBF195
- Vuln IDs
-
- V-223169
- V-97529
- Rule IDs
-
- SV-223169r612236_rule
- SV-106633
Checks: C-24842r531324_chk
Procedure: Open a browser window, type "about:config" in the address bar. Criteria: If the value of "devtools.policy.disabled" is not "true", then this is a finding.
Fix: F-24830r531325_fix
Set the value of "devtools.policy.disabled" to "true" using the Mozilla.cfg file, or the registry value of HKLM\Software\Policies\Mozilla\Firefox\DisableDeveloperTools to “1”
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF200
- Vuln IDs
-
- V-223170
- V-102875
- Rule IDs
-
- SV-223170r612236_rule
- SV-111837
Checks: C-24843r531327_chk
Type "about:config" in the address bar, verify that the preference name “toolkit.telemetry.enabled" is set to “false” and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24831r531328_fix
Ensure the preference “toolkit.telemetry.enabled" is set and locked to the value of “false”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF205
- Vuln IDs
-
- V-223171
- V-102877
- Rule IDs
-
- SV-223171r612236_rule
- SV-111839
Checks: C-24844r531330_chk
Type "about:config" in the address bar, verify that the preference name “toolkit.telemetry.archive.enabled" is set to “false” and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24832r531331_fix
Ensure the preference “toolkit.telemetry.archive.enabled" is set and locked to the value of “false”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF210
- Vuln IDs
-
- V-223172
- V-102879
- Rule IDs
-
- SV-223172r612236_rule
- SV-111841
Checks: C-24845r531333_chk
Type "about:config" in the address bar, verify that the preference name “privacy.trackingprotection.fingerprinting.enabled" is set to “true” and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24833r531334_fix
Ensure the preference “privacy.trackingprotection.fingerprinting.enabled" is set and locked to the value of “true”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF215
- Vuln IDs
-
- V-223173
- V-102881
- Rule IDs
-
- SV-223173r612236_rule
- SV-111843
Checks: C-24846r531336_chk
Type "about:config" in the address bar, verify that the preference name “privacy.trackingprotection.cryptomining.enabled" is set to “true” and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24834r531337_fix
Ensure the preference “privacy.trackingprotection.cryptomining.enabled" is set and locked to the value of “true”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF220
- Vuln IDs
-
- V-223174
- V-102883
- Rule IDs
-
- SV-223174r612236_rule
- SV-111845
Checks: C-24847r531339_chk
Type "about:config" in the address bar, verify that the preference name “browser.contentblocking.category" is set to “strict” and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24835r531340_fix
Ensure the preference “browser.contentblocking.category" is set and locked to the value of “strict”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBF225
- Vuln IDs
-
- V-223175
- V-102885
- Rule IDs
-
- SV-223175r612236_rule
- SV-111847
Checks: C-24848r531342_chk
Type "about:config" in the address bar, verify that the preference name “extensions.htmlaboutaddons.recommendations.enabled" is set to “false” and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24836r531343_fix
Ensure the preference “extensions.htmlaboutaddons.recommendations.enabled" is set and locked to the value of “false”.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- DTBF235
- Vuln IDs
-
- V-223177
- V-102889
- Rule IDs
-
- SV-223177r612236_rule
- SV-111851
Checks: C-24850r531348_chk
Type "about:config" in the address bar, verify that the preference name “security.ssl3.rsa_des_ede3_sha" is set to “false” and locked. Criteria: If the parameter is set incorrectly, then this is a finding. If the setting is not locked, then this is a finding.
Fix: F-24838r531349_fix
Ensure the preference “security.ssl3.rsa_des_ede3_sha" is set and locked to the value of “false”.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- DTBG010
- Vuln IDs
-
- V-223179
- V-6318
- Rule IDs
-
- SV-223179r612236_rule
- SV-33373
Checks: C-24852r531353_chk
Navigate to Tools >> Options >> Advanced >> Certificates tab >> View Certificates button. On the Certificate Manager window, select the "Authorities" tab. Scroll through the Certificate Name list to the U.S. Government heading. Look for the entries for DoD Root CA 2, DoD Root CA 3, and DoD Root CA 4. If there are entries for DoD Root CA 2, DoD Root CA 3, and DoD Root CA 4, select them individually. Click the "View" button. Verify the publishing organization is "US Government." If there are no entries for the DoD Root CA 2, DoD Root CA 3, and DoD Root CA 4, this is a finding. Note: In a Windows environment, use of policy setting "security.enterprise_roots.enabled=true" will point Firefox to the Windows Trusted Root Certification Authority Store, this is not a finding.
Fix: F-24840r531354_fix
Install the DOD root certificates.