Apple has recently addressed a security flaw, CVE-2025-43300, that was actively exploited in the wild. This vulnerability, with a CVSS score of 8.8, involved an out-of-bounds write issue in the ImageIO component, leading to memory corruption when processing a malicious image file. The company acknowledged reports of sophisticated attacks against specific individuals using this flaw.
WhatsApp also confirmed that a vulnerability in its messaging apps for Apple iOS and macOS, CVE-2025-55177 with a CVSS score of 5.4, was combined with CVE-2025-43300 in targeted spyware attacks affecting fewer than 200 individuals. Apple initially addressed the issue with the release of various updates, including iOS 18.6.2, iPadOS 18.6.2, and older versions like iOS 16.7.12 and iPadOS 16.7.12, among others.
The updates have been rolled out for iOS, iPadOS, macOS, tvOS, visionOS, watchOS, Safari, and Xcode, addressing multiple security flaws such as CVE-2025-31255, CVE-2025-43362, CVE-2025-43329, and more. These vulnerabilities could potentially lead to unauthorized data access, keystroke monitoring, sandbox breakouts, and denial-of-service attacks.
While there is no evidence of these flaws being exploited in real-world attacks, it is essential to keep systems up-to-date to ensure optimal protection. Apple’s swift response to patch these vulnerabilities highlights the importance of prompt software updates in mitigating potential security risks.
Source link
