Skip to main content

CVE-2025-6433: WebAuthn would allow a user to sign a challenge on a webpage with an invalid TLS certificate in Mozilla Firefox

Critical
VulnerabilityCVE-2025-6433cvecve-2025-6433
Published: Tue Jun 24 2025 (06/24/2025, 12:28:04 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

If a user visited a webpage with an invalid TLS certificate, and granted an exception, the webpage was able to provide a WebAuthn challenge that the user would be prompted to complete. This is in violation of the WebAuthN spec which requires "a secure transport established without errors". This vulnerability affects Firefox < 140 and Thunderbird < 140.

AI-Powered Analysis

AILast updated: 07/14/2025, 20:37:20 UTC

Technical Analysis

CVE-2025-6433 is a critical security vulnerability affecting Mozilla Firefox versions prior to 140 and Thunderbird versions prior to 140. The vulnerability arises from improper handling of Web Authentication (WebAuthn) challenges on webpages served over TLS connections with invalid certificates. According to the WebAuthn specification, authentication challenges must only be processed over secure transports established without errors, ensuring the integrity and confidentiality of the authentication process. However, in affected Firefox and Thunderbird versions, if a user visits a webpage with an invalid TLS certificate and explicitly grants an exception to bypass browser warnings, the webpage can present a WebAuthn challenge that the user is prompted to complete. This behavior violates the WebAuthn spec and undermines the security guarantees of the protocol. The vulnerability is classified under CWE-295 (Improper Certificate Validation), indicating that the browser fails to enforce strict certificate validation before allowing sensitive authentication operations. The CVSS v3.1 base score is 9.8 (critical), reflecting the high impact on confidentiality, integrity, and availability, with no privileges or user interaction required beyond the initial certificate exception. Exploitation could allow an attacker controlling a malicious or compromised website with an invalid certificate to perform WebAuthn operations, potentially leading to unauthorized authentication or credential theft. Although no known exploits are reported in the wild as of now, the vulnerability's nature and severity make it a significant threat vector, especially in environments where users might be conditioned to bypass TLS warnings or where attackers can perform man-in-the-middle attacks with invalid certificates.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for those relying on Firefox or Thunderbird for secure authentication workflows involving WebAuthn. The ability to bypass TLS certificate validation and still complete WebAuthn challenges could enable attackers to impersonate legitimate services or users, leading to unauthorized access to sensitive systems and data. This undermines trust in web authentication mechanisms and could facilitate credential theft, account takeover, and subsequent lateral movement within networks. Sectors such as finance, government, healthcare, and critical infrastructure, which often employ strong authentication methods like WebAuthn, are at heightened risk. Additionally, the widespread use of Firefox in Europe amplifies the potential impact. The vulnerability could also erode user confidence in browser security, complicating compliance with regulations like GDPR that mandate strong data protection measures. The absence of known exploits currently provides a window for mitigation, but the critical severity demands immediate attention to prevent exploitation, especially in high-value targets.

Mitigation Recommendations

European organizations should prioritize updating Mozilla Firefox and Thunderbird to version 140 or later, where this vulnerability is addressed. Until patches are applied, organizations should implement strict policies disallowing users from bypassing TLS certificate warnings, potentially through browser configuration management or group policies. Network-level controls such as TLS interception detection and blocking connections to sites with invalid certificates can reduce exposure. Security awareness training should emphasize the risks of accepting invalid certificates and educate users on recognizing legitimate warnings. Additionally, organizations can enforce WebAuthn policies that restrict authentication to trusted origins and monitor authentication logs for anomalous WebAuthn challenge completions. Deploying endpoint security solutions capable of detecting suspicious browser behaviors related to certificate exceptions and WebAuthn usage can provide early warning. For high-security environments, consider temporarily disabling WebAuthn features in affected browsers until patches are applied. Finally, coordinate with IT and security teams to audit and inventory affected browser versions across the organization to ensure comprehensive remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-06-20T14:51:39.059Z
Cvss Version
null
State
PUBLISHED

Threat ID: 685aa0274dc24046c1dc5ab6

Added to database: 6/24/2025, 12:55:03 PM

Last enriched: 7/14/2025, 8:37:20 PM

Last updated: 8/15/2025, 6:11:36 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats