Overview
- Researchers from the University of Vienna showed that repeatedly requesting server-held one-time PFS keys exhausts them and causes initial messages to be sent without Perfect Forward Secrecy.
- By monitoring the timing and success of key replenishment, attackers can infer users’ online status, daily routines and even device models for targeted surveillance.
- Flooding WhatsApp with about 2,000 key requests per second triggers a denial-of-service that blocks new messages and calls for the targeted phone number.
- The vulnerability was privately reported to Meta on March 28, but researchers say the bug was misclassified and no public patch or response has been confirmed.
- Simple server-side rate limiting and tighter user privacy settings can mitigate the attack, yet Meta has not announced any deployment timeline for a fix.