Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks

CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks

Posted on September 3, 2025September 3, 2025 By CWS

CISA has issued an pressing advisory regarding a newly disclosed zero-day vulnerability in Meta Platforms’ WhatsApp messaging service (CVE-2025-55177). 

This flaw, categorized below CWE-863: Incorrect Authorization, permits an unauthorized actor to govern linked machine synchronization messages and pressure a goal machine to fetch and course of content material from an attacker-controlled URL. 

Key Takeaways1. CVE-2025-55177 exploits a WhatsApp device-sync auth flaw to fetch malicious URLs.2. CWE-863 error permits RCE and has surfaced in phishing.3. CISA mandates the Sept 2 patch or suspending WhatsApp.

Organizations and particular person customers are strongly urged to use vendor-supplied mitigations by September 23, 2025, or to discontinue use till safe patches can be found.

WhatsApp Authorization Vulnerability (CVE-2025-55177)

CVE-2025-55177 arises from an incomplete authorization verify in WhatsApp’s dealing with of linked machine synchronization messages. 

When a person hyperlinks their WhatsApp shopper on a brand new machine, synchronization messages propagate chat histories and media over a number of endpoints. 

Because of the improper verification of message supply and integrity, an unrelated person can craft a malicious synchronization payload referencing an arbitrary URL. The weak shopper will:

Parse the synchronization message with out verifying the sender’s authorization token.

Provoke a GET request to the attacker-controlled URL to retrieve further payload knowledge.

Execute or show content material corresponding to a JavaScript-powered net web page within the context of the WhatsApp shopper.

This chain of occasions successfully permits distant code execution (RCE) or content material spoofing, which may very well be leveraged to drop payloads starting from credential-stealing scripts to ransomware. 

Whereas it stays unconfirmed whether or not CVE-2025-55177 has been built-in into lively ransomware campaigns, its exploitation in focused phishing operations has already been noticed.

Danger FactorsDetailsAffected ProductsWhatsApp messaging serviceImpactRemote code executionExploit PrerequisitesThe attacker should ship a crafted linked-device synchronization message to the goal.The sufferer’s machine should have an lively linked-device characteristic enabledCVSS 3.1 Score5.4 (MEDIUM)

Mitigations

CISA’s advisory instructs all entities utilizing WhatsApp, notably these in crucial infrastructure sectors, to implement the next steps instantly:

Apply the patch launched on September 2, 2025, by Meta Platforms as outlined of their Safety Advisory.

Implement the seller’s configuration steering, guaranteeing that linked-device synchronization messages are permitted solely from authenticated endpoints.

Observe the Cybersecurity and Infrastructure Safety Company’s Binding Operational Directive (BOD) 22-01 necessities for cloud service safety, together with multi-factor authentication and strong logging of all synchronization occasions.

CISA advises discontinuing WhatsApp utilization till a safe model is deployed. Organizations should additionally monitor community visitors for uncommon outbound HTTP requests originating from WhatsApp purchasers, which can point out exploitation makes an attempt.

As a precaution, safety groups ought to validate patch set up and confirm that the mounted model appropriately rejects unauthorized synchronization payloads.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:0Day, Attacks, CISA, Exploited, Vulnerability, Warns, WhatsApp

Post navigation

Previous Post: Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack
Next Post: Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack

Related Posts

What is Use-After-Free Vulnerability? – Impact and Mitigation What is Use-After-Free Vulnerability? – Impact and Mitigation Cyber Security News
Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Cyber Security News
Chrome 143 Released With Fix for 13 Vulnerabilities that Enables Arbitrary Code Execution Chrome 143 Released With Fix for 13 Vulnerabilities that Enables Arbitrary Code Execution Cyber Security News
Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091 Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091 Cyber Security News
Potential Wallet Phishing Campaign Targets Cardano Users via ‘Eternl Desktop’ Announcement Potential Wallet Phishing Campaign Targets Cardano Users via ‘Eternl Desktop’ Announcement Cyber Security News
Hackers Stolen 0,000 in Crypto Assets by Weaponizing AI Extension Hackers Stolen $500,000 in Crypto Assets by Weaponizing AI Extension Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News