WhatsApp Zero-Click Flaw

At Pwn2Own Ireland 2025, researchers discovered a potential zero-click remote code execution vulnerability affecting WhatsApp. The research team chose to withdraw their on-stage demonstration and instead privately disclose the issue to Meta through a coordinated process designed to give the vendor time to investigate and patch. The decision prioritizes responsible disclosure and reduces the chance of immediate exploitation against WhatsApp’s roughly three billion users.

Zero-click flaws are especially dangerous because they require no interaction from the target. Past zero-click exploits have been used in high-profile spyware campaigns and can lead to device takeover, data theft, and silent persistent access. Because no technical details or CVE assignment have been published yet, defenders must take a posture of heightened vigilance while waiting for vendor advisories and patches.

What happened and why it matters
  • A high-value exploit discovered at Pwn2Own was not publicly demoed. Instead, the researchers submitted it to Meta for private remediation.
  • Event organizers allow a standard disclosure window so vendors can validate and patch critical issues before public release. This approach reduces risk but places urgency on vendors and defenders to act quickly.
  • A zero-click remote code execution vulnerability in a mainstream messaging app can enable broad impact across personal devices and corporate mobile fleets. Attackers could gain access to messages, contacts, microphones, cameras, and potentially pivot into corporate networks via BYOD endpoints.
  • No technical indicators, affected versions, or CVE details have been published yet. Expect an advisory and patches from Meta; treat any related telemetry with high priority.
Immediate actions for security teams
  1. Treat mobile endpoints as critical assets – increase logging and telemetry for mobile device management (MDM) and EDR agents that support mobile platforms.
  2. Accelerate patch testing and deployment – when Meta releases a patch, validate and push it to managed devices immediately.
  3. Harden BYOD and corporate mobile policies – require managed profiles, restrict sensitive app usage on unmanaged devices, and enforce strong device enrollment controls.
  4. Monitor for suspicious behavior – hunt for unusual app behavior, unexpected requests for elevated permissions, abnormal network connections from mobile devices, and signs of device compromise.
  5. Validate supplier and vendor controls – ensure third-party vendors that integrate with messaging platforms follow secure development and disclosure practices.
  6. Review incident response plans for mobile compromise – include processes for rapid token revocation, session invalidation, forensic capture, and secure wipe of affected devices.
  7. Inform executive and privacy teams – zero-click compromises can affect sensitive personal and business communications; prepare regulatory and customer communications playbooks.
Broader implications for industries

Messaging apps are ubiquitous across organizations and sectors. A successful zero-click exploit can be weaponized for targeted espionage or broad fraud campaigns, so industries handling sensitive data should treat this as a high-priority risk:

  • Financial services – customer authentication, transaction approvals, and internal communications rely on secure mobile devices.
  • Healthcare – clinician communications and patient coordination often occur over mobile messaging apps.
  • Government and public sector – devices used by officials can be high-value intelligence targets.
  • Technology and SaaS providers – developer and ops staff using personal devices can introduce supply-chain or operational risk.
  • Media and legal firms – confidential sources and privileged communications are at elevated risk.
Conclusion

The private disclosure at Pwn2Own shows the security community doing the right thing to reduce immediate risk, but it also underlines a stark reality: mobile messaging platforms are high-value targets and zero-click exploits can produce devastating, silent compromises. Organizations must treat mobile security with the same urgency as servers and cloud infrastructure. Prepare now by tightening mobile controls, accelerating patching, and rehearsing mobile compromise scenarios.

About COE Security

COE Security partners with organizations in financial services, healthcare, retail, manufacturing, and government to secure AI-powered systems and ensure compliance. Our offerings include: AI-enhanced threat detection and real-time monitoring Data governance aligned with GDPR, HIPAA, and PCI DSS Secure model validation to guard against adversarial attacks Customized training to embed AI security best practices Penetration Testing (Mobile, Web, AI, Product, IoT, Network & Cloud) Secure Software Development Consulting (SSDLC) Customized CyberSecurity Services

In addition, based on incidents like zero-click messaging exploits, we provide:

  • Mobile app security assessments and runtime analysis for messaging clients
  • Zero-click and remote exploitation threat hunting for mobile fleets
  • MDM/EDR validation and rapid patch orchestration for managed devices
  • Incident response playbooks tailored to messaging platform compromises, including token revocation and forensic capture
  • Secure integration reviews for vendors that extend messaging platforms into enterprise workflows

Follow COE Security on LinkedIn for ongoing insights into safe, compliant AI adoption and to stay updated and cyber safe.

Click to read our LinkedIn feature article