Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks

Posted on September 3, 2025September 3, 2025 By CWS

CISA has issued an pressing advisory regarding a newly disclosed zero-day vulnerability in Meta Platforms’ WhatsApp messaging service (CVE-2025-55177). 

This flaw, categorized below CWE-863: Incorrect Authorization, permits an unauthorized actor to govern linked machine synchronization messages and pressure a goal machine to fetch and course of content material from an attacker-controlled URL. 

Key Takeaways1. CVE-2025-55177 exploits a WhatsApp device-sync auth flaw to fetch malicious URLs.2. CWE-863 error permits RCE and has surfaced in phishing.3. CISA mandates the Sept 2 patch or suspending WhatsApp.

Organizations and particular person customers are strongly urged to use vendor-supplied mitigations by September 23, 2025, or to discontinue use till safe patches can be found.

WhatsApp Authorization Vulnerability (CVE-2025-55177)

CVE-2025-55177 arises from an incomplete authorization verify in WhatsApp’s dealing with of linked machine synchronization messages. 

When a person hyperlinks their WhatsApp shopper on a brand new machine, synchronization messages propagate chat histories and media over a number of endpoints. 

Because of the improper verification of message supply and integrity, an unrelated person can craft a malicious synchronization payload referencing an arbitrary URL. The weak shopper will:

Parse the synchronization message with out verifying the sender’s authorization token.

Provoke a GET request to the attacker-controlled URL to retrieve further payload knowledge.

Execute or show content material corresponding to a JavaScript-powered net web page within the context of the WhatsApp shopper.

This chain of occasions successfully permits distant code execution (RCE) or content material spoofing, which may very well be leveraged to drop payloads starting from credential-stealing scripts to ransomware. 

Whereas it stays unconfirmed whether or not CVE-2025-55177 has been built-in into lively ransomware campaigns, its exploitation in focused phishing operations has already been noticed.

Danger FactorsDetailsAffected ProductsWhatsApp messaging serviceImpactRemote code executionExploit PrerequisitesThe attacker should ship a crafted linked-device synchronization message to the goal.The sufferer’s machine should have an lively linked-device characteristic enabledCVSS 3.1 Score5.4 (MEDIUM)

Mitigations

CISA’s advisory instructs all entities utilizing WhatsApp, notably these in crucial infrastructure sectors, to implement the next steps instantly:

Apply the patch launched on September 2, 2025, by Meta Platforms as outlined of their Safety Advisory.

Implement the seller’s configuration steering, guaranteeing that linked-device synchronization messages are permitted solely from authenticated endpoints.

Observe the Cybersecurity and Infrastructure Safety Company’s Binding Operational Directive (BOD) 22-01 necessities for cloud service safety, together with multi-factor authentication and strong logging of all synchronization occasions.

CISA advises discontinuing WhatsApp utilization till a safe model is deployed. Organizations should additionally monitor community visitors for uncommon outbound HTTP requests originating from WhatsApp purchasers, which can point out exploitation makes an attempt.

As a precaution, safety groups ought to validate patch set up and confirm that the mounted model appropriately rejects unauthorized synchronization payloads.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:0Day, Attacks, CISA, Exploited, Vulnerability, Warns, WhatsApp

Post navigation

Previous Post: Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack
Next Post: Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack

Related Posts

Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight Cyber Security News
Blockchain for Cybersecurity Real-World Applications and Limits Cyber Security News
Cloudflare Unveils MCP Server Portals to Secure AI Revolution Cyber Security News
Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials Cyber Security News
Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media Cyber Security News
Researchers Uncovered on How Russia Leverages Private Companies, Hacktivist to Strengthen Cyber Capabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage
  • Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats
  • Chrome 140 Released With Fix For Six Vulnerabilities that Enable Remote Code Execution Attacks
  • Jaguar Land Rover Operations ‘Severely Disrupted’ by Cyberattack
  • Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage
  • Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats
  • Chrome 140 Released With Fix For Six Vulnerabilities that Enable Remote Code Execution Attacks
  • Jaguar Land Rover Operations ‘Severely Disrupted’ by Cyberattack
  • Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News