Apple has backported security patches released to address an actively exploited vulnerability tracked as CVE-2025-43300.
In August 2025, Apple addressed the actively exploited zero-day CVE-2025-43300 in iOS, iPadOS, and macOS. The vulnerability is zero-day out-of-bounds write issue that resides in the ImageIO framework, an attacker could exploit it to cause memory corruption when processing a malicious image.
“Processing a malicious image file may result in memory corruption.” reads the advisory published by the tech giant. “Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.”
The company fixed the problem with improved bounds checking. Apple released the following updates to fix the issue:
As usual, the company did not share technical details about the attacks exploiting this vulnerability.
WhatsApp recently confirmed attackers chained CVE-2025-55177 with CVE-2025-43300 in spyware campaigns targeting fewer than 200 people. Apple patched the flaws in recent iOS, iPadOS, and macOS updates, including older versions.
Below are the updates released by Apple to address the issue:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, CVE-2025-43300)