Article Details
Scrape Timestamp (UTC): 2025-08-30 04:38:31.671
Source: https://thehackernews.com/2025/08/whatsapp-issues-emergency-update-for.html
Original Article Text
Click to Toggle View
WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices. WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it said may have been exploited in the wild in conjunction with a recently disclosed Apple flaw in targeted zero-day attacks. The vulnerability, CVE-2025-55177 (CVSS score: 8.0), relates to a case of insufficient authorization of linked device synchronization messages. Internal researchers on the WhatsApp Security Team have been credited with discovering and rerating the bug. The Meta-owned company said the issue "could have allowed an unrelated user to trigger processing of content from an arbitrary URL on a target's device." The flaw affects the following versions - It also assessed that the shortcoming may have been chained with CVE-2025-43300, a vulnerability affecting iOS, iPadOS, and macOS, as part of a sophisticated attack against specific targeted users. CVE-2025-43300 was disclosed by Apple last week as having been weaponized in an "extremely sophisticated attack against specific targeted individuals." The vulnerability in question is an out-of-bounds write vulnerability in the ImageIO framework that could result in memory corruption when processing a malicious image. Donncha Ó Cearbhaill, head of the Security Lab at Amnesty International, said WhatsApp has notified an unspecified number of individuals that they believe were targeted by an advanced spyware campaign in the past 90 days using CVE-2025-55177. In the alert sent to the targeted individuals, WhatsApp has also recommended performing a full device factory reset and keeping their operating system and the WhatsApp app up-to-date for optimal protection. It's currently not known who, or which spyware vendor, is behind the attacks. Ó Cearbhaill described the pair of vulnerabilities as a "zero-click" attack, meaning it does not require any user interaction, such as clicking a link, to compromise their device. "Early indications are that the WhatsApp attack is impacting both iPhone and Android users, civil society individuals among them," Ó Cearbhaill said. "Government spyware continues to pose a threat to journalists and human rights defenders."
Daily Brief Summary
WhatsApp released an emergency update to fix CVE-2025-55177, a critical vulnerability affecting iOS and macOS devices, discovered by its internal security team.
The flaw allowed unauthorized processing of content from arbitrary URLs, potentially exploited in zero-day attacks targeting specific users.
This vulnerability may have been used in conjunction with CVE-2025-43300, an Apple-disclosed flaw involving memory corruption in the ImageIO framework.
Amnesty International's Security Lab noted that the attack impacted both iPhone and Android users, including civil society members.
WhatsApp has alerted affected individuals, advising a full device reset and regular updates for enhanced security.
The attack method, described as "zero-click," requires no user interaction, posing significant risks to journalists and human rights defenders.
The identity of the threat actors or spyware vendors behind these sophisticated campaigns remains unknown.