Article Details
Scrape Timestamp (UTC): 2025-09-16 12:21:10.099
Original Article Text
Click to Toggle View
Apple backports zero-day patches to older iPhones and iPads. Apple has released security updates to backport patches released last month to older iPhones and iPads, addressing a zero-day bug that was exploited in "extremely sophisticated" attacks. This security flaw is the same one Apple has patched for devices running iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, and macOS (Sequoia 15.6.1, Sonoma 14.7.8, and Ventura 13.7.8) on August 20. Tracked as CVE-2025-43300, this vulnerability was discovered by Apple security researchers and is caused by an out-of-bounds write weakness in the Image I/O framework, which enables apps to read and write image file formats. An out-of-bounds write occurs when attackers supply maliciously crafted input to a program that causes it to write data outside the allocated memory buffer, potentially triggering crashes, corrupting data, or even allowing remote code execution. Apple has now addressed this zero-day flaw in iOS 15.8.5 / 16.7.12, as well as iPadOS 15.8.5 / 16.7.12, with improved bounds checks. "Processing a malicious image file may result in memory corruption. An out-of-bounds write issue was addressed with improved bounds checking," the company said in Monday advisories. "Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals." The list of devices impacted by this vulnerability is quite extensive, with the bug affecting a wide range of older models, including: In late August, WhatsApp patched a zero-click vulnerability (CVE-2025-55177) in its iOS and macOS messaging clients, which was chained with Apple's CVE-2025-43300 zero-day in targeted attacks that the company described as "extremely sophisticated." While Apple and WhatsApp have yet to release any details regarding the attacks chaining the two vulnerabilities, Donncha Ó Cearbhaill, the head of Amnesty International's Security Lab, said that WhatsApp warned some of its users that their devices were targeted in an advanced spyware campaign. Last week, Samsung also patched a remote code execution vulnerability chained with the CVE-2025-55177 WhatsApp flaw in zero-day attacks targeting its Android devices. With this vulnerability, Apple fixed six zero-days that were exploited in the wild in 2025: the first in January (CVE-2025-24085), the second in February (CVE-2025-24200), a third in March (CVE-2025-24201), and two more in April(CVE-2025-31200 and CVE-2025-31201). Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Apple issued security updates for older iPhones and iPads to address a zero-day vulnerability exploited in sophisticated attacks, tracked as CVE-2025-43300.
The flaw, found in the Image I/O framework, involves an out-of-bounds write that could lead to crashes, data corruption, or remote code execution.
Devices running iOS 15.8.5 / 16.7.12 and iPadOS 15.8.5 / 16.7.12 received patches with improved bounds checks to mitigate this vulnerability.
The zero-day was part of a complex attack chain, also involving a WhatsApp vulnerability, targeting specific individuals with advanced spyware.
Amnesty International's Security Lab indicated that WhatsApp warned users of targeted attacks, though detailed information on the attack chain remains undisclosed.
This patch is part of Apple's ongoing efforts, having addressed six zero-days exploited in 2025, enhancing device security across multiple platforms.
Organizations should prioritize updating affected devices to mitigate potential risks associated with these vulnerabilities and protect sensitive data.