This flaw, categorized under CWE-863: Incorrect Authorization, allows an unauthorized actor to manipulate linked device synchronization messages and force a target device to fetch and process content from an attacker-controlled URL.
Key Takeaways
1. CVE-2025-55177 exploits a WhatsApp device-sync auth flaw to fetch malicious URLs.
2. CWE-863 error enables RCE and has surfaced in phishing.
3. CISA mandates the Sept 2 patch or suspending WhatsApp.
Organizations and individual users are strongly urged to apply vendor-supplied mitigations by September 23, 2025, or to discontinue use until secure patches are available.
CVE-2025-55177 arises from an incomplete authorization check in WhatsApp’s handling of linked device synchronization messages.
When a user links their WhatsApp client on a new device, synchronization messages propagate chat histories and media over multiple endpoints.
Due to the improper verification of message source and integrity, an unrelated user can craft a malicious synchronization payload referencing an arbitrary URL. The vulnerable client will:
This chain of events effectively enables remote code execution (RCE) or content spoofing, which could be leveraged to drop payloads ranging from credential-stealing scripts to ransomware.
While it remains unconfirmed whether CVE-2025-55177 has been integrated into active ransomware campaigns, its exploitation in targeted phishing operations has already been observed.
| Risk Factors | Details |
| Affected Products | WhatsApp messaging service |
| Impact | Remote code execution |
| Exploit Prerequisites | The attacker must send a crafted linked-device synchronization message to the target. The victim’s device must have an active linked-device feature enabled |
| CVSS 3.1 Score | 5.4 (MEDIUM) |
CISA’s advisory instructs all entities using WhatsApp, particularly those in critical infrastructure sectors, to implement the following steps immediately:
Apply the patch released on September 2, 2025, by Meta Platforms as outlined in their Security Advisory.
Enforce the vendor’s configuration guidance, ensuring that linked-device synchronization messages are permitted only from authenticated endpoints.
Follow the Cybersecurity and Infrastructure Security Agency’s Binding Operational Directive (BOD) 22-01 requirements for cloud service security, including multi-factor authentication and robust logging of all synchronization events.
CISA advises discontinuing WhatsApp usage until a secure version is deployed. Organizations must also monitor network traffic for unusual outbound HTTP requests originating from WhatsApp clients, which may indicate exploitation attempts.
As a precaution, security teams should validate patch installation and verify that the fixed version correctly rejects unauthorized synchronization payloads.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks appeared first on Cyber Security News.
In honor and support of Women’s History Month, state Rep. Joanna McClinton, the first woman…
The Live Nation-Ticketmaster trial is back on. Dozens of states are expected to move forward…
Less slop please. | Image: Spotify Spotify Premium users in New Zealand will be the…
Editor’s Note: The Abilene Police Department supplied the following arrest and incident reports. All information…
Editor’s Note: The Abilene Police Department supplied the following arrest and incident reports. All information…
WEEKEND WEATHER: WINDY with a push of BRIEF Arctic Air
This website uses cookies.