Article Details

Scrape Timestamp (UTC): 2025-09-12 19:30:30.040

Source: https://www.theregister.com/2025/09/12/samsung_fixes_android_0day/

Original Article Text

Click to Toggle View

Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages. A similar vuln on Apple devices was used against 'specific targeted users'. Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow remote code execution on affected devices. The vulnerability, tracked as CVE-2025-21043, affects Android OS versions 13, 14, 15, and 16. It's due to an out-of-bounds write vulnerability in libimagecodec.quram.so, a parsing library used to process image formats on Samsung devices, which remote attackers can abuse to execute malicious code. "Samsung was notified that an exploit for this issue has existed in the wild," the electronics giant noted in its September security update. The Meta and WhatsApp security teams found the flaw and reported it to Samsung on August 13. Apps that process images on Samsung kit, potentially including WhatsApp, may trigger this library, but Samsung didn't name specific apps. The warning is interesting, because Meta shortly thereafter issued a security advisory warning that attackers may have chained a WhatsApp bug with an Apple OS-level flaw in highly targeted attacks. The WhatsApp August security update included a fix for CVE-2025-55177 that, as Meta explained, "could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target's device." That security advisory went on to say, "We assess that this vulnerability, in combination with an OS-level vulnerability on Apple platforms (CVE-2025-43300), may have been exploited in a sophisticated attack against specific targeted users." CVE-2025-43300 is an out-of-bounds write issue that Apple addressed on August 20 with a patch that improves bounds checking in the ImageIO framework. "Processing a malicious image file may result in memory corruption," the iThings maker said at the time. "Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals." While Meta didn't mention the newer Android OS-level flaw in its August WhatsApp security update, it seems that CVE-2025-21043 could also be chained to CVE-2025-55177 for a similar attack targeting WhatsApp users on Samsung Android devices instead of Apple's. Samsung did not immediately respond, and Meta declined to answer The Register's questions, including whether CVE-2025-21043 was used in attacks targeting WhatsApp users with Samsung phones. According to a source familiar with the matter, however, an out-of-bounds write vulnerability in a particular library on Samsung devices may have been exploited to target WhatsApp users and remotely execute code on their devices. In the August alerts, neither Meta nor Apple detailed who was behind these intrusions.  The companies' words - "extremely sophisticated attack against specific targeted individuals" - along with a similar warning from Amnesty International's security boss, suggest a commercial surveillanceware vendor is to blame. Donncha Ó Cearbhaill, the head of Amnesty International's Security Lab, on August 29 sounded the alarm on a zero-click exploit being used to hack WhatsApp users.  "Early indications are that the WhatsApp attack is impacting both iPhone and Android users, civil society individuals among them," he said on social media. "Our team at Amnesty International's Security Lab is actively investigating cases with a number of individuals targeted in this campaign."

Daily Brief Summary

VULNERABILITIES // Samsung and Apple Address Critical Vulnerabilities in Targeted Attacks

Samsung patched a critical Android vulnerability (CVE-2025-21043) that allowed remote code execution, affecting devices running Android OS versions 13 through 16.

The flaw, found in the image processing library libimagecodec.quram.so, was exploited in the wild before the patch, potentially impacting apps like WhatsApp.

Meta and WhatsApp's security teams reported the vulnerability to Samsung, indicating a possible link to a similar Apple OS-level flaw (CVE-2025-43300).

Apple's vulnerability, also an out-of-bounds write issue, was patched on August 20, addressing a sophisticated attack vector targeting specific users.

Amnesty International's Security Lab is investigating these attacks, suggesting involvement of a commercial surveillanceware vendor targeting civil society individuals.

The incidents underline the critical need for timely vulnerability management and cross-platform collaboration in addressing emerging threats.

While Samsung and Meta have not disclosed specific attackers, the nature of the attacks points to highly targeted campaigns, raising concerns over digital privacy.