Categories: Cyber Security News

CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks

CISA has issued an urgent advisory concerning a newly disclosed zero-day vulnerability in Meta Platforms’ WhatsApp messaging service (CVE-2025-55177). 

This flaw, categorized under CWE-863: Incorrect Authorization, allows an unauthorized actor to manipulate linked device synchronization messages and force a target device to fetch and process content from an attacker-controlled URL. 

Key Takeaways
1. CVE-2025-55177 exploits a WhatsApp device-sync auth flaw to fetch malicious URLs.
2. CWE-863 error enables RCE and has surfaced in phishing.
3. CISA mandates the Sept 2 patch or suspending WhatsApp.

Organizations and individual users are strongly urged to apply vendor-supplied mitigations by September 23, 2025, or to discontinue use until secure patches are available.

WhatsApp Authorization Vulnerability (CVE-2025-55177)

CVE-2025-55177 arises from an incomplete authorization check in WhatsApp’s handling of linked device synchronization messages. 

When a user links their WhatsApp client on a new device, synchronization messages propagate chat histories and media over multiple endpoints. 

Due to the improper verification of message source and integrity, an unrelated user can craft a malicious synchronization payload referencing an arbitrary URL. The vulnerable client will:

  • Parse the synchronization message without verifying the sender’s authorization token.
  • Initiate a GET request to the attacker-controlled URL to retrieve additional payload data.
  • Execute or display content such as a JavaScript-powered web page in the context of the WhatsApp client.

This chain of events effectively enables remote code execution (RCE) or content spoofing, which could be leveraged to drop payloads ranging from credential-stealing scripts to ransomware. 

While it remains unconfirmed whether CVE-2025-55177 has been integrated into active ransomware campaigns, its exploitation in targeted phishing operations has already been observed.

Risk Factors Details
Affected Products WhatsApp messaging service
Impact Remote code execution
Exploit Prerequisites The attacker must send a crafted linked-device synchronization message to the target.
The victim’s device must have an active linked-device feature enabled
CVSS 3.1 Score 5.4 (MEDIUM)

Mitigations

CISA’s advisory instructs all entities using WhatsApp, particularly those in critical infrastructure sectors, to implement the following steps immediately:

Sponsored

Apply the patch released on September 2, 2025, by Meta Platforms as outlined in their Security Advisory.

Enforce the vendor’s configuration guidance, ensuring that linked-device synchronization messages are permitted only from authenticated endpoints.

Follow the Cybersecurity and Infrastructure Security Agency’s Binding Operational Directive (BOD) 22-01 requirements for cloud service security, including multi-factor authentication and robust logging of all synchronization events.

CISA advises discontinuing WhatsApp usage until a secure version is deployed. Organizations must also monitor network traffic for unusual outbound HTTP requests originating from WhatsApp clients, which may indicate exploitation attempts.

As a precaution, security teams should validate patch installation and verify that the fixed version correctly rejects unauthorized synchronization payloads.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Pennsylvania House Speaker Joanna McClinton to Headline NAACP Bucks County’s Women’s History Month Town Hall in Newtown

In honor and support of Women’s History Month, state Rep. Joanna McClinton, the first woman…

10 minutes ago

States’ anti-monopoly case against Live Nation continues Monday

The Live Nation-Ticketmaster trial is back on. Dozens of states are expected to move forward…

50 minutes ago

Spotify tests letting users directly customize their Taste Profile

Less slop please. | Image: Spotify Spotify Premium users in New Zealand will be the…

50 minutes ago

Crime Reports: Deadly conduct reported in Abilene

Editor’s Note: The Abilene Police Department supplied the following arrest and incident reports. All information…

2 hours ago

Crime Reports: Deadly conduct reported in Abilene

Editor’s Note: The Abilene Police Department supplied the following arrest and incident reports. All information…

2 hours ago

WEEKEND WEATHER: WINDY with a push of BRIEF Arctic Air

WEEKEND WEATHER: WINDY with a push of BRIEF Arctic Air

2 hours ago

This website uses cookies.