Firefox and Tor Browser Uniquely Vulnerable to Stable Identifier Leak
Researchers from Fingerprint.com have uncovered a significant privacy flaw affecting Firefox-based browsers, including Tor Browser. The vulnerability stems from how IndexedDB databases are enumerated via indexedDB.databases(). The order in which these databases are returned can serve as a stable identifier, linking a browser’s activity across different sites within a single session.
This bypasses standard privacy protections. In Tor Browser, this identifier persisted even after using the ‘New Identity’ feature, which is designed to break such tracking. With just 16 database names, attackers can achieve approximately 44 bits of entropy, sufficient to uniquely fingerprint a specific browser instance. Mozilla has already released patches for Firefox 150 and ESR 140.10.0 to address this issue.
What This Means For You
- If you are using Firefox or any browser based on its engine (including Tor Browser), update immediately. This vulnerability allows for persistent browser fingerprinting, undermining anonymity and potentially linking user activity across sessions and even across Tor identity switches. Ensure your entire user base is running patched versions.
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Firefox/Tor Browser IndexedDB Enumeration for Fingerprinting