{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-55031","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","state":"PUBLISHED","assignerShortName":"mozilla","dateReserved":"2025-08-05T13:26:34.686Z","datePublished":"2025-08-19T20:52:49.748Z","dateUpdated":"2026-04-13T14:29:00.921Z"},"containers":{"cna":{"affected":[{"product":"Firefox for iOS","vendor":"Mozilla","versions":[{"status":"unaffected","version":"142","lessThanOrEqual":"*","versionType":"rpm"}]},{"product":"Focus for iOS","vendor":"Mozilla","versions":[{"status":"unaffected","version":"142","lessThanOrEqual":"*","versionType":"rpm"}]}],"descriptions":[{"lang":"en","value":"Malicious pages could use Firefox for iOS to pass FIDO: links to the OS and trigger the hybrid passkey transport. An attacker within Bluetooth range could have used this to trick the user into using their passkey to log the attacker's computer into the target account. This vulnerability was fixed in Firefox for iOS 142 and Focus for iOS 142.","supportingMedia":[{"type":"text/html","base64":false,"value":"Malicious pages could use Firefox for iOS to pass FIDO: links to the OS and trigger the hybrid passkey transport. An attacker within Bluetooth range could have used this to trick the user into using their passkey to log the attacker's computer into the target account. This vulnerability was fixed in Firefox for iOS 142 and Focus for iOS 142."}]}],"title":"Passkey phishing within Bluetooth range","references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1979499"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1979804"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-68/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-69/"}],"credits":[{"lang":"en","value":"Hafiizh"}],"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2026-04-13T14:29:00.921Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-601","lang":"en","description":"CWE-601 URL Redirection to Untrusted Site ('Open Redirect')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-08-20T14:01:38.460614Z","id":"CVE-2025-55031","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-20T15:17:12.739Z"}}]}}