Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apple Patches CVE-2025-43300 Zero-Day in iOS, iPadOS, and macOS Exploited in Targeted Attacks

Apple Patches CVE-2025-43300 Zero-Day in iOS, iPadOS, and macOS Exploited in Targeted Attacks

Posted on August 21, 2025August 21, 2025 By CWS

Aug 21, 2025Ravie LakshmananVulnerability / Zero-Day
Apple has launched safety updates to deal with a safety flaw impacting iOS, iPadOS, and macOS that it stated has come underneath energetic exploitation within the wild.
The zero-day out-of-bounds write vulnerability, tracked as CVE-2025-43300, resides within the ImageIO framework that might end in reminiscence corruption when processing a malicious picture.
“Apple is conscious of a report that this concern might have been exploited in an especially subtle assault towards particular focused people,” the corporate stated in an advisory.

The iPhone maker stated the bug was internally found and that it was addressed with improved bounds checking. The next variations tackle the safety defect –

iOS 18.6.2 and iPadOS 18.6.2 – iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third era and later, iPad Professional 11-inch 1st era and later, iPad Air third era and later, iPad seventh era and later, and iPad mini fifth era and later
iPadOS 17.7.10 – iPad Professional 12.9-inch 2nd era, iPad Professional 10.5-inch, and iPad sixth era
macOS Ventura 13.7.8 – Macs operating macOS Ventura
macOS Sonoma 14.7.8 – Macs operating macOS Sonoma
macOS Sequoia 15.6.1 – Macs operating macOS Sequoia

It is presently not identified who’s behind the assaults and who might have been focused, but it surely’s possible that the vulnerability has been weaponised as a part of extremely focused assaults.
With the newest replace, Apple has thus far mounted a complete of seven zero-days which were abused in real-world assaults for the reason that begin of the yr: CVE-2025-24085, CVE-2025-24200, CVE-2025-24201, CVE-2025-31200, CVE-2025-31201, and CVE-2025-43200.
Final month, the corporate additionally issued patches for a Safari vulnerability residing in an open-source element (CVE-2025-6558) that Google reported as having been exploited as a zero-day within the Chrome net browser.

The Hacker News Tags:Apple, Attacks, CVE202543300, Exploited, IOS, iPadOS, macOS, Patches, Targeted, ZeroDay

Post navigation

Previous Post: Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times
Next Post: Europol Says Qilin Ransomware Reward Fake

Related Posts

RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities The Hacker News
Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud The Hacker News
Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation The Hacker News
AI Becomes Russia’s New Cyber Weapon in War on Ukraine AI Becomes Russia’s New Cyber Weapon in War on Ukraine The Hacker News
Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files The Hacker News
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark