Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Apple 0-Day Vulnerability Actively Exploited in the Wild

Critical Apple 0-Day Vulnerability Actively Exploited in the Wild

Posted on August 21, 2025August 21, 2025 By CWS

Apple launched emergency safety updates for iOS and iPadOS to patch a important zero-day vulnerability in its core Picture I/O framework. The flaw, tracked as CVE-2025-43300, is confirmed to be beneath lively exploitation in extremely focused assaults.

The pressing patches, launched as iOS 18.6.2 and iPadOS 18.6.2, deal with a reminiscence corruption vulnerability that could possibly be triggered by processing a specifically crafted picture file.

In accordance with Apple’s safety advisory, the corporate is “conscious of a report that this challenge might have been exploited in a particularly subtle assault towards particular focused people.”

On the coronary heart of the problem is an out-of-bounds write inside the ImageIO framework, a part elementary to how Apple’s working programs deal with and render numerous picture codecs.

By sending a malicious picture, an attacker may write information outdoors of the meant reminiscence buffer. The sort of reminiscence corruption flaw is a basic vector for reaching arbitrary code execution, doubtlessly permitting an attacker to take full management of an affected system.

The focused nature of the exploit suggests the involvement of subtle menace actors, reminiscent of state-sponsored teams growing spy ware.

This assault sample is much like previous zero-click exploits used to deploy surveillance instruments like Pegasus, the place victims are compromised just by receiving a file through a messaging app, with no consumer interplay required.

In response to this menace, Apple has made safety patches obtainable for a variety of units:

iPhone XS and later

iPad Professional (13-inch, 12.9-inch third gen and later, 11-inch 1st gen and later)

iPad Air third era and later

iPad seventh era and later

iPad mini fifth era and later

The repair addresses the vulnerability by implementing improved bounds checking, stopping the out-of-bounds write from occurring. Apple has credited itself with the invention of the vulnerability, which is frequent apply when a flaw is recognized internally or by means of the evaluation of an ongoing assault.

The lively exploitation of CVE-2025-43300 elevates it from a theoretical danger to a transparent and current hazard for customers of unpatched units.

Safety researchers and Apple alike strongly advise all customers to put in the updates instantly by means of the Software program Replace perform of their system’s Settings to guard themselves from these focused assaults.

Safely detonate suspicious recordsdata to uncover threats, enrich your investigations, and minimize incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:0Day, Actively, Apple, Critical, Exploited, Vulnerability, Wild

Post navigation

Previous Post: How to Stay Anonymous Online
Next Post: Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times

Related Posts

Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cyber Security News
Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram Cyber Security News
Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections Cyber Security News
Microsoft Defender for Office 365 to Block Email Bombing Attacks Microsoft Defender for Office 365 to Block Email Bombing Attacks Cyber Security News
1inch Named Exclusive Swap Provider at Launch for Ledger Multisig 1inch Named Exclusive Swap Provider at Launch for Ledger Multisig Cyber Security News
MathWorks Confirms Cyberattack, User Personal Information Stolen MathWorks Confirms Cyberattack, User Personal Information Stolen Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News