CVE-2025-55031: Passkey phishing within Bluetooth range in Mozilla Firefox for iOS
Malicious pages could use Firefox for iOS to pass FIDO: links to the OS and trigger the hybrid passkey transport. An attacker within Bluetooth range could have used this to trick the user into using their passkey to log the attacker's computer into the target account. This vulnerability affects Firefox for iOS < 142 and Focus for iOS < 142.
AI Analysis
Technical Summary
CVE-2025-55031 is a critical security vulnerability affecting Mozilla Firefox for iOS versions prior to 142, including Firefox Focus for iOS. The vulnerability arises from the way Firefox for iOS handles FIDO passkey authentication links, specifically leveraging the hybrid passkey transport mechanism that involves communication between the browser and the operating system. An attacker within Bluetooth range can exploit this flaw by hosting a malicious webpage that triggers the browser to initiate a passkey authentication process. Because the hybrid transport can use Bluetooth, the attacker can trick the user into unknowingly authenticating their passkey, effectively allowing the attacker to log into the victim's account on the attacker's device. This attack vector requires proximity due to Bluetooth range limitations but does not require any user interaction or prior authentication, making it highly dangerous. The vulnerability is classified under CWE-601 (Open Redirect), indicating that the malicious page abuses redirection mechanisms to initiate the attack. The CVSS 3.1 base score is 9.8, reflecting critical severity with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential for abuse is significant given the widespread use of Firefox on iOS devices and the increasing adoption of passkey authentication as a phishing-resistant login method. The vulnerability highlights a novel phishing technique exploiting Bluetooth-based hybrid passkey transport, undermining the security guarantees of passkey authentication by leveraging proximity-based attacks.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for entities relying on Firefox for iOS for secure authentication using passkeys. The attack can lead to unauthorized account access without user interaction, potentially exposing sensitive corporate data, intellectual property, and personal information. Given the criticality of the flaw, threat actors could use this to bypass strong authentication controls, facilitating account takeover, data breaches, and lateral movement within networks. Sectors such as finance, government, healthcare, and critical infrastructure in Europe are particularly at risk due to their reliance on secure authentication and the high value of their data. The proximity requirement means attacks are more feasible in public or semi-public spaces such as conferences, airports, or corporate campuses, where attackers can be physically close to targets. The vulnerability undermines trust in passkey authentication, which is being promoted as a phishing-resistant alternative to passwords, potentially slowing adoption of stronger authentication methods in Europe. Additionally, the lack of user interaction requirement increases the stealthiness of the attack, making detection and prevention more challenging.
Mitigation Recommendations
European organizations should urgently update Firefox for iOS and Firefox Focus for iOS to version 142 or later once patches are released by Mozilla. Until patches are available, organizations should consider the following mitigations: 1) Educate users about the risks of using Firefox for iOS in untrusted environments and advise caution when browsing unknown websites, especially in public spaces. 2) Limit Bluetooth usage on iOS devices during sensitive operations or disable Bluetooth when not needed to reduce attack surface. 3) Implement network segmentation and endpoint detection to monitor for unusual authentication events or account logins from unexpected devices. 4) Encourage multi-factor authentication methods that do not rely solely on passkeys or hybrid transport mechanisms vulnerable to proximity attacks. 5) Collaborate with mobile device management (MDM) solutions to enforce browser version controls and restrict installation of vulnerable app versions. 6) Monitor security advisories from Mozilla and apply patches promptly to minimize exposure. 7) Consider alternative browsers or authentication methods on iOS devices until the vulnerability is fully mitigated.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2025-55031: Passkey phishing within Bluetooth range in Mozilla Firefox for iOS
Description
Malicious pages could use Firefox for iOS to pass FIDO: links to the OS and trigger the hybrid passkey transport. An attacker within Bluetooth range could have used this to trick the user into using their passkey to log the attacker's computer into the target account. This vulnerability affects Firefox for iOS < 142 and Focus for iOS < 142.
AI-Powered Analysis
Technical Analysis
CVE-2025-55031 is a critical security vulnerability affecting Mozilla Firefox for iOS versions prior to 142, including Firefox Focus for iOS. The vulnerability arises from the way Firefox for iOS handles FIDO passkey authentication links, specifically leveraging the hybrid passkey transport mechanism that involves communication between the browser and the operating system. An attacker within Bluetooth range can exploit this flaw by hosting a malicious webpage that triggers the browser to initiate a passkey authentication process. Because the hybrid transport can use Bluetooth, the attacker can trick the user into unknowingly authenticating their passkey, effectively allowing the attacker to log into the victim's account on the attacker's device. This attack vector requires proximity due to Bluetooth range limitations but does not require any user interaction or prior authentication, making it highly dangerous. The vulnerability is classified under CWE-601 (Open Redirect), indicating that the malicious page abuses redirection mechanisms to initiate the attack. The CVSS 3.1 base score is 9.8, reflecting critical severity with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential for abuse is significant given the widespread use of Firefox on iOS devices and the increasing adoption of passkey authentication as a phishing-resistant login method. The vulnerability highlights a novel phishing technique exploiting Bluetooth-based hybrid passkey transport, undermining the security guarantees of passkey authentication by leveraging proximity-based attacks.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for entities relying on Firefox for iOS for secure authentication using passkeys. The attack can lead to unauthorized account access without user interaction, potentially exposing sensitive corporate data, intellectual property, and personal information. Given the criticality of the flaw, threat actors could use this to bypass strong authentication controls, facilitating account takeover, data breaches, and lateral movement within networks. Sectors such as finance, government, healthcare, and critical infrastructure in Europe are particularly at risk due to their reliance on secure authentication and the high value of their data. The proximity requirement means attacks are more feasible in public or semi-public spaces such as conferences, airports, or corporate campuses, where attackers can be physically close to targets. The vulnerability undermines trust in passkey authentication, which is being promoted as a phishing-resistant alternative to passwords, potentially slowing adoption of stronger authentication methods in Europe. Additionally, the lack of user interaction requirement increases the stealthiness of the attack, making detection and prevention more challenging.
Mitigation Recommendations
European organizations should urgently update Firefox for iOS and Firefox Focus for iOS to version 142 or later once patches are released by Mozilla. Until patches are available, organizations should consider the following mitigations: 1) Educate users about the risks of using Firefox for iOS in untrusted environments and advise caution when browsing unknown websites, especially in public spaces. 2) Limit Bluetooth usage on iOS devices during sensitive operations or disable Bluetooth when not needed to reduce attack surface. 3) Implement network segmentation and endpoint detection to monitor for unusual authentication events or account logins from unexpected devices. 4) Encourage multi-factor authentication methods that do not rely solely on passkeys or hybrid transport mechanisms vulnerable to proximity attacks. 5) Collaborate with mobile device management (MDM) solutions to enforce browser version controls and restrict installation of vulnerable app versions. 6) Monitor security advisories from Mozilla and apply patches promptly to minimize exposure. 7) Consider alternative browsers or authentication methods on iOS devices until the vulnerability is fully mitigated.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-08-05T13:26:34.686Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a4e678ad5a09ad00fb5d92
Added to database: 8/19/2025, 9:02:48 PM
Last enriched: 8/27/2025, 1:13:18 AM
Last updated: 8/27/2025, 1:13:18 AM
Views: 5
Related Threats
CVE-2025-8663: CWE-532 Insertion of Sensitive Information into Log File in upKeeper Solutions upKeeper Manager
HighCVE-2025-9378: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themehunk Vayu Blocks – Website Builder for the Block Editor
MediumCVE-2025-58210: CWE-862 Missing Authorization in ThemeMove Makeaholic
MediumCVE-2025-21041: CWE-922 Insecure Storage of Sensitive Information in Samsung Mobile Secure Folder
MediumCVE-2025-21040: CWE-925 : Improper Verification of Intent by Broadcast Receiver in Samsung Mobile S Assistant
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.