Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack

Posted on September 16, 2025September 16, 2025 By CWS

Sep 16, 2025Ravie LakshmananVulnerability / Adware
Apple on Monday backported fixes for a lately patched safety flaw that has been actively exploited within the wild.
The vulnerability in query is CVE-2025-43300 (CVSS rating: 8.8), an out-of-bounds write subject within the ImageIO element that might lead to reminiscence corruption when processing a malicious picture file.
“Apple is conscious of a report that this subject could have been exploited in a particularly subtle assault in opposition to particular focused people,” the corporate mentioned.
Since then, WhatsApp has acknowledged {that a} vulnerability in its messaging apps for Apple iOS and macOS (CVE-2025-55177, CVSS rating: 5.4) had been chained with CVE-2025-43300 as a part of highly-targeted spyware and adware assaults aimed toward lower than 200 people.

Whereas the shortcoming was first addressed by the iPhone maker late final month with the discharge of iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Ventura 13.7.8, macOS Sonoma 14.7.8, and macOS Sequoia 15.6.1, it has additionally been launched for the next older variations –

iOS 16.7.12 and iPadOS 16.7.12 – iPhone 8, iPhone 8 Plus, iPhone X, iPad fifth era, iPad Professional 9.7-inch, and iPad Professional 12.9-inch 1st era
iOS 15.8.5 and iPadOS 15.8.5 – iPhone 6s (all fashions), iPhone 7 (all fashions), iPhone SE (1st era), iPad Air 2, iPad mini (4th era), and iPod contact (seventh era)

The updates have been rolled out alongside iOS 26, iPadOS 26, iOS 18.7, iPadOS 18.7, macOS Tahoe 26, macOS Sequoia 15.7, macOS Sonoma 14.8, tvOS 26, visionOS 26, watchOS 26, Safari 26, and Xcode 26, which additionally tackle a variety of different safety flaws –

CVE-2025-31255 – An authorization vulnerability in IOKit that might permit an app to entry delicate information
CVE-2025-43362 – A vulnerability in LaunchServices that might permit an app to watch keystrokes with out person permission
CVE-2025-43329 – A permissions vulnerability in Sandbox that might permit an app to interrupt out of its sandbox
CVE-2025-31254 – A vulnerability in Safari that might lead to sudden URL redirection when processing maliciously crafted internet content material
CVE-2025-43272 – A vulnerability in WebKit that might lead to sudden Safari crash when processing maliciously crafted internet content material
CVE-2025-43285 – A permissions vulnerability in AppSandbox that might permit an app to entry protected person information
CVE-2025-43349 – An out-of-bounds write subject in CoreAudio that might lead to sudden app termination when processing a maliciously crafted video file
CVE-2025-43316 – A permissions vulnerability in DiskArbitration that might permit an app to achieve root privileges
CVE-2025-43297 – A kind confusion vulnerability in Energy Administration that might lead to a denial-of-service
CVE-2025-43204 – A vulnerability in RemoteViewServices that might permit an app to interrupt out of its sandbox
CVE-2025-43358 – A permissions vulnerability in Shortcuts that might permit a shortcut to bypass sandbox restrictions
CVE-2025-43333 – A permissions vulnerability in Highlight that might permit an app to achieve root privileges
CVE-2025-43304 – A race situation vulnerability in StorageKit that might permit an app to achieve root privileges
CVE-2025-48384 – A Git vulnerability in Xcode that might lead to distant code execution when cloning a maliciously crafted repository

Whereas there is no such thing as a proof that any of the aforementioned flaws have been weaponized in real-world assaults, it is at all times an excellent apply to maintain techniques up-to-date for optimum safety.

The Hacker News Tags:Apple, Attack, Backports, CVE202543300, Exploited, Fix, Sophisticated, Spyware

Post navigation

Previous Post: Introducing Astrix’s AI Agent Control Plane
Next Post: Rowhammer Attack Demonstrated Against DDR5

Related Posts

What Attackers Are Doing With Them The Hacker News
Beyond Vulnerability Management – Can You CVE What I CVE? The Hacker News
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch The Hacker News
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them The Hacker News
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
  • KillSec Ransomware Attacking Healthcare Industry IT Systems
  • Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 
  • Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection
  • Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
  • KillSec Ransomware Attacking Healthcare Industry IT Systems
  • Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 
  • Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection
  • Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News