CVE-2024-9956 – PassKey Account Takeover in All Mobile Browsers
Patch status and vendor response
- Vulnerability was reported in 2024; major fixes shipped later:
- Chrome: v130 (Oct 2024), Edge: v130-based (Oct 2024).
- Safari: 18.3 (Jan 2025).
- Firefox: 136 (Mar 2025).
- Commenters note Chrome/Google reacted fastest; Firefox was slower mainly because contact with Mozilla apparently only succeeded in Feb 2025.
- Debate over whether this reflects prioritization, resources, or disclosure timing; consensus that all three big vendors behaved professionally once aware.
Attack mechanics and impact
- Attack uses browser support for
fido:intents plus BLE “caBLE” cross‑device authentication:- Victim visits attacker’s site.
- Site triggers a passkey flow that actually talks (via BLE) to the attacker’s device, which proxies to the real site.
- Result: attacker doesn’t get the private key or “credential” itself but obtains a valid authenticated session, often enough for account takeover (e.g., register their own passkey).
- Analogy: more like abusing an SSH agent socket than stealing an SSH private key.
BLE, pairing, and proximity
- Clarified that traditional Bluetooth pairing is not needed; BLE advertisements are unidirectional broadcasts used to prove proximity and can be relayed (“Bluetooth wormhole”).
- “Within Bluetooth range” refers to RF distance, not prior pairing; proxying can extend range arbitrarily, constrained mainly by signal strength and practicality.
Fixes and residual attack surface
- Main browser fix: block navigation to
fido:URLs from web content (while still allowing legitimate QR-scanner/OS flows). - Some uncertainty remains around QR-based attacks where a page displays a QR that encodes a FIDO URL and BLE is proxied; mitigations rely on UI separation and user training.
Phishing resistance vs. “phishing proof”
- Discussion around marketing claims:
- Many materials say “phishing resistant”, not “phishing proof”.
- Several commenters see this bug as a serious but narrow, non-scalable attack requiring physical proximity and a tailored setup—still far better than password phishing at Internet scale.
- Others call it an “epic fail” for a system sold primarily on anti‑phishing properties and a reminder that no scheme is truly “unphishable”.
User mitigations and broader attitudes
- Practical advice:
- Avoid or distrust cross-device/BLE passkey flows if concerned; prefer on-device passkeys or password-manager-based implementations.
- Disabling Bluetooth or limiting its use is suggested by some, though others argue that Bluetooth is integral for wearables/headphones and should be hardened, not abandoned.
- Some participants feel vindicated sticking with strong passwords + hardware/OTP 2FA; others report good experiences with passkeys (especially via password managers) but worry about vendor lock-in and export.