Security teams woke up to a zero day vulnerability affecting multiple passwordless authentication providers. Attackers can bypass the intended cryptographic proof, forging login requests without possession of the required key material. The flaw appears in the validation layer — the code path that checks identity tokens before granting access. That layer is supposed to be airtight. This time, it wasn’t.
Reports confirm that the exploit leverages a malformed assertion combined with a race condition. Under heavy concurrent requests, the authentication service fails to reject invalid tokens, letting unauthorized sessions pass through. Even environments configured with FIDO2 or WebAuthn are at risk if the vulnerable library is in use.
This passwordless authentication zero day vulnerability is not theoretical. Proof-of-concept code is already public. Cloud and on-prem systems have been targeted. The combination of bypassing MFA and skipping passwords altogether makes compromise fast and silent. Threat actors can blend into normal user traffic, leaving detection to come too late.