Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Apple 0-Day Vulnerability Actively Exploited in the Wild

Posted on August 21, 2025August 21, 2025 By CWS

Apple launched emergency safety updates for iOS and iPadOS to patch a important zero-day vulnerability in its core Picture I/O framework. The flaw, tracked as CVE-2025-43300, is confirmed to be beneath lively exploitation in extremely focused assaults.

The pressing patches, launched as iOS 18.6.2 and iPadOS 18.6.2, deal with a reminiscence corruption vulnerability that could possibly be triggered by processing a specifically crafted picture file.

In accordance with Apple’s safety advisory, the corporate is “conscious of a report that this challenge might have been exploited in a particularly subtle assault towards particular focused people.”

On the coronary heart of the problem is an out-of-bounds write inside the ImageIO framework, a part elementary to how Apple’s working programs deal with and render numerous picture codecs.

By sending a malicious picture, an attacker may write information outdoors of the meant reminiscence buffer. The sort of reminiscence corruption flaw is a basic vector for reaching arbitrary code execution, doubtlessly permitting an attacker to take full management of an affected system.

The focused nature of the exploit suggests the involvement of subtle menace actors, reminiscent of state-sponsored teams growing spy ware.

This assault sample is much like previous zero-click exploits used to deploy surveillance instruments like Pegasus, the place victims are compromised just by receiving a file through a messaging app, with no consumer interplay required.

In response to this menace, Apple has made safety patches obtainable for a variety of units:

iPhone XS and later

iPad Professional (13-inch, 12.9-inch third gen and later, 11-inch 1st gen and later)

iPad Air third era and later

iPad seventh era and later

iPad mini fifth era and later

The repair addresses the vulnerability by implementing improved bounds checking, stopping the out-of-bounds write from occurring. Apple has credited itself with the invention of the vulnerability, which is frequent apply when a flaw is recognized internally or by means of the evaluation of an ongoing assault.

The lively exploitation of CVE-2025-43300 elevates it from a theoretical danger to a transparent and current hazard for customers of unpatched units.

Safety researchers and Apple alike strongly advise all customers to put in the updates instantly by means of the Software program Replace perform of their system’s Settings to guard themselves from these focused assaults.

Safely detonate suspicious recordsdata to uncover threats, enrich your investigations, and minimize incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:0Day, Actively, Apple, Critical, Exploited, Vulnerability, Wild

Post navigation

Previous Post: How to Stay Anonymous Online
Next Post: Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times

Related Posts

Google Vulnerability Let Attackers Access Any Google User Phone Number Cyber Security News
BlackHat AI Hacking Tool WormGPT Variant Powered by Grok and Mixtral Cyber Security News
NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks Cyber Security News
Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks Cyber Security News
APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Patches Zero-Day Exploited in Targeted Attacks
  • Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine
  • Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft
  • Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data
  • Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Patches Zero-Day Exploited in Targeted Attacks
  • Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine
  • Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft
  • Critical Apache Tika PDF Parser Vulnerability Allow Attackers to Access Sensitive Data
  • Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News