Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55031: Vulnerability in Mozilla Firefox for iOS

0
Critical
VulnerabilityCVE-2025-55031cvecve-2025-55031
Published: Tue Aug 19 2025 (08/19/2025, 20:52:49 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox for iOS

Description

Malicious pages could use Firefox for iOS to pass FIDO: links to the OS and trigger the hybrid passkey transport. An attacker within Bluetooth range could have used this to trick the user into using their passkey to log the attacker's computer into the target account. This vulnerability affects Firefox for iOS < 142 and Focus for iOS < 142.

AI-Powered Analysis

AILast updated: 10/31/2025, 05:02:09 UTC

Technical Analysis

CVE-2025-55031 is a critical security vulnerability affecting Mozilla Firefox for iOS and Focus for iOS versions below 142. The vulnerability arises from the browser's handling of FIDO authentication links, specifically the hybrid passkey transport mechanism. Malicious web pages can craft FIDO: links that interact with the iOS operating system to initiate passkey authentication processes. An attacker physically located within Bluetooth range of the victim can exploit this by tricking the user’s device into using their FIDO passkey to authenticate the attacker’s device to the victim’s account. This attack does not require user interaction or prior authentication, making it highly dangerous. The vulnerability is categorized under CWE-601, indicating an open redirect or improper URL handling issue that facilitates this attack vector. The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, low attack complexity, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the potential for account takeover and unauthorized access is significant. The vulnerability affects all Firefox for iOS and Focus for iOS installations prior to version 142, which are widely used browsers on Apple mobile devices. This flaw highlights the risks associated with hybrid authentication mechanisms and the importance of secure handling of FIDO passkey transports in mobile browsers.

Potential Impact

For European organizations, this vulnerability poses a severe risk to user account security, especially for employees or users relying on Firefox or Focus browsers on iOS devices. The ability for an attacker to authenticate to a victim’s account without user interaction or credentials can lead to unauthorized access to sensitive corporate resources, data breaches, and potential lateral movement within networks. Organizations with mobile workforces or those in sectors with high Bluetooth device density (e.g., urban offices, conferences) are particularly vulnerable. The compromise of user accounts could result in loss of confidentiality, integrity, and availability of critical systems and data. Additionally, the attack vector requiring Bluetooth proximity means that physical security and device management policies become crucial. The vulnerability could also undermine trust in FIDO-based authentication methods if exploited at scale, impacting broader security postures.

Mitigation Recommendations

Organizations should prioritize updating Firefox for iOS and Focus for iOS to version 142 or later as soon as patches become available. Until patches are deployed, restricting Bluetooth access on iOS devices, especially in high-risk environments, can reduce the attack surface. Implementing strict device usage policies that limit browser use on iOS devices in sensitive areas can help mitigate risk. Network segmentation and monitoring for unusual authentication patterns related to FIDO passkeys should be enhanced. Educating users about the risks of connecting to unknown Bluetooth devices and encouraging vigilance when browsing untrusted sites is important. Additionally, organizations should review their FIDO authentication configurations and consider multi-factor authentication fallback mechanisms that do not rely solely on passkeys vulnerable to this attack. Security teams should monitor Mozilla advisories for updates and any emerging exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-08-05T13:26:34.686Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a4e678ad5a09ad00fb5d92

Added to database: 8/19/2025, 9:02:48 PM

Last enriched: 10/31/2025, 5:02:09 AM

Last updated: 12/1/2025, 6:38:21 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats