Synced Passkeys Vulnerable to Enterprise Attacks
Summary
Hide ▲
Show ▼
Synced passkeys, which are credentials stored in an authenticator and synced across devices through cloud services, pose significant security risks for enterprises. These risks include cloud account takeovers, authentication downgrade attacks, and browser-based security vulnerabilities. Device-bound passkeys in hardware security keys offer higher assurance and better administrative control, and should be mandatory for enterprise access use cases. Synced passkeys shift the trust boundary to cloud accounts and recovery workflows, expanding the attack surface. Adversaries can exploit these vulnerabilities to gain unauthorized access to enterprise systems. Organizations should prioritize device-bound passkeys to enhance security.
Timeline
-
15.10.2025 14:30 1 articles · 23h ago
Synced Passkeys Vulnerable to Enterprise Attacks
Synced passkeys, which are credentials stored in an authenticator and synced across devices through cloud services, pose significant security risks for enterprises. These risks include cloud account takeovers, authentication downgrade attacks, and browser-based security vulnerabilities. Adversaries can exploit these vulnerabilities to gain unauthorized access to enterprise systems. Organizations should prioritize device-bound passkeys to enhance security.
Show sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30
Information Snippets
-
Synced passkeys are credentials stored in an authenticator and synced across devices through cloud services like iCloud and Google Cloud.
First reported: 15.10.2025 14:301 source, 1 articleShow sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30
-
Synced passkeys shift the trust boundary to cloud accounts and recovery workflows, expanding the attack surface.
First reported: 15.10.2025 14:301 source, 1 articleShow sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30
-
Adversary-in-the-middle (AiTM) kits can force authentication fallbacks, circumventing strong authentication.
First reported: 15.10.2025 14:301 source, 1 articleShow sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30
-
Malicious or compromised browser extensions can hijack WebAuthn requests, manipulate passkey registration or sign-in, and drive autofill to leak credentials and one-time codes.
First reported: 15.10.2025 14:301 source, 1 articleShow sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30
-
Device-bound passkeys in hardware security keys offer higher assurance and better administrative control than synced passkeys.
First reported: 15.10.2025 14:301 source, 1 articleShow sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30
-
Proofpoint researchers documented a practical downgrade attack against Microsoft Entra ID, where a phishing proxy spoofs an unsupported browser, disabling passkeys and guiding users to select weaker authentication methods.
First reported: 15.10.2025 14:301 source, 1 articleShow sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30
-
SquareX researchers showed that a compromised browser environment can hijack WebAuthn calls and manipulate passkey registration or sign-in.
First reported: 15.10.2025 14:301 source, 1 articleShow sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30
-
Chrome's webAuthenticationProxy API can intercept navigator.credentials.create() and navigator.credentials.get() methods, allowing extensions to sit in the WebAuthn path.
First reported: 15.10.2025 14:301 source, 1 articleShow sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30
-
Independent research presented at DEF CON described DOM-based extension clickjacking that targets the UI elements injected by password manager extensions, potentially exploiting passkey authentication.
First reported: 15.10.2025 14:301 source, 1 articleShow sources
- How Attackers Bypass Synced Passkeys — thehackernews.com — 15.10.2025 14:30