CVE-2025-55031: Vulnerability in Mozilla Firefox for iOS
Malicious pages could use Firefox for iOS to pass FIDO: links to the OS and trigger the hybrid passkey transport. An attacker within Bluetooth range could have used this to trick the user into using their passkey to log the attacker's computer into the target account. This vulnerability affects Firefox for iOS < 142 and Focus for iOS < 142.
AI Analysis
Technical Summary
CVE-2025-55031 is a critical security vulnerability affecting Mozilla Firefox for iOS and Focus for iOS versions below 142. The vulnerability arises from the browser's handling of FIDO authentication links, specifically the hybrid passkey transport mechanism. Malicious web pages can craft FIDO: links that interact with the iOS operating system to initiate passkey authentication processes. An attacker physically located within Bluetooth range of the victim can exploit this by tricking the user’s device into using their FIDO passkey to authenticate the attacker’s device to the victim’s account. This attack does not require user interaction or prior authentication, making it highly dangerous. The vulnerability is categorized under CWE-601, indicating an open redirect or improper URL handling issue that facilitates this attack vector. The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, low attack complexity, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the potential for account takeover and unauthorized access is significant. The vulnerability affects all Firefox for iOS and Focus for iOS installations prior to version 142, which are widely used browsers on Apple mobile devices. This flaw highlights the risks associated with hybrid authentication mechanisms and the importance of secure handling of FIDO passkey transports in mobile browsers.
Potential Impact
For European organizations, this vulnerability poses a severe risk to user account security, especially for employees or users relying on Firefox or Focus browsers on iOS devices. The ability for an attacker to authenticate to a victim’s account without user interaction or credentials can lead to unauthorized access to sensitive corporate resources, data breaches, and potential lateral movement within networks. Organizations with mobile workforces or those in sectors with high Bluetooth device density (e.g., urban offices, conferences) are particularly vulnerable. The compromise of user accounts could result in loss of confidentiality, integrity, and availability of critical systems and data. Additionally, the attack vector requiring Bluetooth proximity means that physical security and device management policies become crucial. The vulnerability could also undermine trust in FIDO-based authentication methods if exploited at scale, impacting broader security postures.
Mitigation Recommendations
Organizations should prioritize updating Firefox for iOS and Focus for iOS to version 142 or later as soon as patches become available. Until patches are deployed, restricting Bluetooth access on iOS devices, especially in high-risk environments, can reduce the attack surface. Implementing strict device usage policies that limit browser use on iOS devices in sensitive areas can help mitigate risk. Network segmentation and monitoring for unusual authentication patterns related to FIDO passkeys should be enhanced. Educating users about the risks of connecting to unknown Bluetooth devices and encouraging vigilance when browsing untrusted sites is important. Additionally, organizations should review their FIDO authentication configurations and consider multi-factor authentication fallback mechanisms that do not rely solely on passkeys vulnerable to this attack. Security teams should monitor Mozilla advisories for updates and any emerging exploit reports.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-55031: Vulnerability in Mozilla Firefox for iOS
Description
Malicious pages could use Firefox for iOS to pass FIDO: links to the OS and trigger the hybrid passkey transport. An attacker within Bluetooth range could have used this to trick the user into using their passkey to log the attacker's computer into the target account. This vulnerability affects Firefox for iOS < 142 and Focus for iOS < 142.
AI-Powered Analysis
Technical Analysis
CVE-2025-55031 is a critical security vulnerability affecting Mozilla Firefox for iOS and Focus for iOS versions below 142. The vulnerability arises from the browser's handling of FIDO authentication links, specifically the hybrid passkey transport mechanism. Malicious web pages can craft FIDO: links that interact with the iOS operating system to initiate passkey authentication processes. An attacker physically located within Bluetooth range of the victim can exploit this by tricking the user’s device into using their FIDO passkey to authenticate the attacker’s device to the victim’s account. This attack does not require user interaction or prior authentication, making it highly dangerous. The vulnerability is categorized under CWE-601, indicating an open redirect or improper URL handling issue that facilitates this attack vector. The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, low attack complexity, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the potential for account takeover and unauthorized access is significant. The vulnerability affects all Firefox for iOS and Focus for iOS installations prior to version 142, which are widely used browsers on Apple mobile devices. This flaw highlights the risks associated with hybrid authentication mechanisms and the importance of secure handling of FIDO passkey transports in mobile browsers.
Potential Impact
For European organizations, this vulnerability poses a severe risk to user account security, especially for employees or users relying on Firefox or Focus browsers on iOS devices. The ability for an attacker to authenticate to a victim’s account without user interaction or credentials can lead to unauthorized access to sensitive corporate resources, data breaches, and potential lateral movement within networks. Organizations with mobile workforces or those in sectors with high Bluetooth device density (e.g., urban offices, conferences) are particularly vulnerable. The compromise of user accounts could result in loss of confidentiality, integrity, and availability of critical systems and data. Additionally, the attack vector requiring Bluetooth proximity means that physical security and device management policies become crucial. The vulnerability could also undermine trust in FIDO-based authentication methods if exploited at scale, impacting broader security postures.
Mitigation Recommendations
Organizations should prioritize updating Firefox for iOS and Focus for iOS to version 142 or later as soon as patches become available. Until patches are deployed, restricting Bluetooth access on iOS devices, especially in high-risk environments, can reduce the attack surface. Implementing strict device usage policies that limit browser use on iOS devices in sensitive areas can help mitigate risk. Network segmentation and monitoring for unusual authentication patterns related to FIDO passkeys should be enhanced. Educating users about the risks of connecting to unknown Bluetooth devices and encouraging vigilance when browsing untrusted sites is important. Additionally, organizations should review their FIDO authentication configurations and consider multi-factor authentication fallback mechanisms that do not rely solely on passkeys vulnerable to this attack. Security teams should monitor Mozilla advisories for updates and any emerging exploit reports.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-08-05T13:26:34.686Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a4e678ad5a09ad00fb5d92
Added to database: 8/19/2025, 9:02:48 PM
Last enriched: 10/31/2025, 5:02:09 AM
Last updated: 12/1/2025, 6:38:21 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13810: Path Traversal in jsnjfz WebStack-Guns
MediumCVE-2025-13809: Server-Side Request Forgery in orionsec orion-ops
MediumCVE-2025-13808: Improper Authorization in orionsec orion-ops
MediumCVE-2025-13807: Improper Authorization in orionsec orion-ops
MediumCVE-2025-13806: Improper Authorization in nutzam NutzBoot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.