Article Details
Scrape Timestamp (UTC): 2025-09-16 11:14:28.183
Source: https://thehackernews.com/2025/09/apple-backports-fix-for-cve-2025-43300.html
Original Article Text
Click to Toggle View
Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack. Apple on Monday backported fixes for a recently patched security flaw that has been actively exploited in the wild. The vulnerability in question is CVE-2025-43300 (CVSS score: 8.8), an out-of-bounds write issue in the ImageIO component that could result in memory corruption when processing a malicious image file. "Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals," the company said. Since then, WhatsApp has acknowledged that a vulnerability in its messaging apps for Apple iOS and macOS (CVE-2025-55177, CVSS score: 5.4) had been chained with CVE-2025-43300 as part of highly-targeted spyware attacks aimed at less than 200 individuals. While the shortcoming was first addressed by the iPhone maker late last month with the release of iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Ventura 13.7.8, macOS Sonoma 14.7.8, and macOS Sequoia 15.6.1, it has also been released for the following older versions - The updates have been rolled out alongside iOS 26, iPadOS 26, iOS 18.7, iPadOS 18.7, macOS Tahoe 26, macOS Sequoia 15.7, macOS Sonoma 14.8, tvOS 26, visionOS 26, watchOS 26, Safari 26, and Xcode 26, which also address a number of other security flaws - While there is no evidence that any of the aforementioned flaws have been weaponized in real-world attacks, it's always a good practice to keep systems up-to-date for optimal protection.
Daily Brief Summary
Apple has issued backported fixes for CVE-2025-43300, an out-of-bounds write vulnerability in the ImageIO component, actively exploited in sophisticated spyware attacks.
This vulnerability, with a CVSS score of 8.8, can lead to memory corruption when processing malicious image files, posing significant security risks.
The flaw was part of a targeted attack chain with CVE-2025-55177, impacting less than 200 individuals via WhatsApp on iOS and macOS platforms.
Apple initially addressed the issue with updates to iOS 18.6.2, iPadOS 18.6.2, and various macOS versions, and has now extended patches to older systems.
The updates also cover additional security vulnerabilities across multiple Apple platforms, including iOS, iPadOS, macOS, tvOS, visionOS, watchOS, Safari, and Xcode.
While no other flaws have been exploited in real-world attacks, maintaining up-to-date systems is crucial for optimal security and protection.
This incident emphasizes the importance of timely patching and vigilance against potential exploitation in targeted cyber threats.