Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks

Posted on August 22, 2025August 22, 2025 By CWS

CISA has issued an pressing warning concerning a vital zero-day vulnerability affecting Apple’s iOS, iPadOS, and macOS working programs that menace actors are actively exploiting. 

The vulnerability, tracked as CVE-2025-43300, has been added to CISA’s Recognized Exploited Vulnerabilities (KEV) catalog, signaling fast motion is required from organizations and particular person customers to guard their programs from potential compromise.

Key Takeaways1. CVE-2025-43300 in Apple gadgets permits code execution by malicious photographs.2. Actively exploited by menace actors concentrating on iOS, iPadOS, and macOS programs.3. Set up Apple safety updates instantly; federal deadline September 11, 2025.

Out-of-Bounds Write Flaw 

The newly disclosed vulnerability represents an out-of-bounds write weak spot inside Apple’s Picture I/O framework, labeled beneath CWE-787 (Out-of-bounds Write). 

This kind of vulnerability permits attackers to write down information past the supposed boundaries of allotted reminiscence buffers, probably resulting in arbitrary code execution, system crashes, or privilege escalation. 

The Picture I/O framework is chargeable for studying and writing picture information throughout Apple’s ecosystem, making this vulnerability notably regarding on account of its widespread utilization in processing varied picture codecs, together with JPEG, PNG, and HEIF information.

Safety researchers point out that the flaw might be triggered by maliciously crafted picture information, enabling attackers to execute arbitrary code with the privileges of the affected utility. 

The vulnerability impacts a number of Apple working system variations, making a broad assault floor that encompasses iPhones, iPads, and Mac computer systems throughout enterprise and shopper environments.

CISA’s inclusion of CVE-2025-43300 within the KEV catalog, dated August 21, 2025, establishes a compulsory remediation deadline of September 11, 2025, for all federal civilian government department businesses. 

Beneath Binding Operational Directive (BOD) 22-01), these organizations should apply vendor-supplied mitigations or discontinue use of affected merchandise if patches stay unavailable.

The company’s swift response underscores the severity of lively exploitation makes an attempt concentrating on this vulnerability. 

Whereas CISA has not but decided whether or not the flaw is being leveraged in ransomware campaigns, the company’s steerage emphasizes treating this as a high-priority safety subject requiring fast consideration from community defenders and cybersecurity groups.

Threat FactorsDetailsAffected ProductsApple iOSApple iPadOSApple macOSImpactArbitrary Code ExecutionPotential Privilege EscalationExploit PrerequisitesMaliciously crafted picture fileUser interplay with picture processingAccess to Picture I/O frameworkCVSS 3.1 Score8.8 (Excessive)

Apple has launched safety updates addressing the vulnerability throughout affected platforms, with detailed mitigation steerage obtainable by a number of help bulletins. 

Organizations ought to prioritize implementing these patches as a part of their vulnerability administration frameworks, notably given the zero-day nature of the menace and confirmed exploitation within the wild.

The vulnerability’s presence within the KEV catalog serves as a vital enter for cybersecurity professionals creating risk-based remediation methods. 

Community defenders ought to leverage CISA’s authoritative vulnerability intelligence to reinforce their menace detection capabilities and guarantee complete protection of identified assault vectors concentrating on Apple’s extensively deployed working programs.

Safely detonate suspicious information to uncover threats, enrich your investigations, and minimize incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:0Day, Apple, Attacks, CISA, Exploited, IOS, iPadOS, macOS, Vulnerability, Warns

Post navigation

Previous Post: Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages
Next Post: Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts

Related Posts

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale Cyber Security News
New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability Cyber Security News
Internet Archive Abused for Hosting Stealthy JScript Loader Malware Cyber Security News
Windows BitLocker Bypass Vulnerability Let Attackers Bypass Security Feature Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
New QUIC-LEAK Vulnerability Let Attackers Exhaust Server Memory and Trigger DoS Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts
  • CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks
  • Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts
  • CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks
  • Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News