Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File

Posted on September 29, 2025September 29, 2025 By CWS

WhatsApp 0-click distant code execution (RCE) vulnerability affecting Apple’s iOS, macOS, and iPadOS platforms, detailed with a proof of idea demonstration.

The assault chain exploits two distinct vulnerabilities, recognized as CVE-2025-55177 and CVE-2025-43300, to compromise a goal system with out requiring consumer interplay.

The exploit, demonstrated in a proof-of-concept (PoC) shared by the DarkNavyOrg researchers, is initiated by sending a specifically crafted malicious (DNG) picture file to a sufferer’s WhatsApp account.

As a “zero-click” assault, the vulnerability is triggered mechanically upon receipt of the malicious message, making it notably harmful as victims haven’t any alternative to stop the compromise.

0-click Assault PoC WhatsApp

WhatsApp 0-Click on Vulnerability Exploit Chain

The assault’s entry level is CVE-2025-55177, a vital logic flaw inside WhatsApp’s dealing with of messages.

Based on DarkNavyOrg, the vulnerability stems from a lacking validation examine to verify that an incoming message originates from a reputable linked system.

This oversight permits an attacker to ship a message that seems to be from a trusted supply, bypassing preliminary safety checks and delivering the malicious payload.

We triggered WhatsApp 0-click on iOS/macOS/iPadOS.CVE-2025-55177 arises from lacking validation that the [Redacted] message originates from a linked system, enabling specifically crafted DNG parsing that triggers CVE-2025-43300.Evaluation of Samsung CVE-2025-21043 can be ongoing. pic.twitter.com/idwZXqh5WK— DARKNAVY (@DarkNavyOrg) September 28, 2025

As soon as the message is delivered, the second vulnerability, CVE-2025-43300, is triggered. This flaw resides within the software’s DNG file parsing library.

The attacker crafts a malformed DNG picture that, when processed by WhatsApp, causes a reminiscence corruption error, resulting in distant code execution.

The proof-of-concept shared by the researchers reveals a script that automates the method: logging into WhatsApp, producing the malformed DNG, and sending the payload to a goal cellphone quantity. This mixture permits for a seamless and silent compromise of the focused system.

This zero-click RCE vulnerability poses a extreme risk to customers of WhatsApp on a number of Apple gadgets, together with iPhones, Mac computer systems, and iPads.

A profitable exploit may grant an attacker full management over a tool, enabling them to entry delicate information, monitor communications, and deploy additional malware. The stealthy nature of the assault means a tool may very well be compromised with none seen indicators.

The invention highlights the continuing safety challenges related to complicated file codecs and cross-platform messaging purposes. Flaws in file parsers have traditionally been a typical vector for RCE exploits, as they course of untrusted exterior information.

DarkNavyOrg has indicated that its evaluation is ongoing, together with a separate investigation right into a Samsung-related vulnerability (CVE-2025-21043).

For now, WhatsApp customers are suggested to make sure their purposes and working methods are all the time up to date to the newest variations to obtain safety patches as quickly as they change into obtainable. Each WhatsApp and Apple are anticipated to handle these vital vulnerabilities in upcoming safety updates.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.


Cyber Security News Tags:0click, DNG, Exploited, File, Malicious, Vulnerability, WhatsApp

Post navigation

Previous Post: SUSE Rancher Vulnerabilities Let Attackers Lockout the Administrators Account
Next Post: Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention

Related Posts

HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM Cyber Security News
Why Real-Time Threat Intelligence Is Critical for Modern SOCs Cyber Security News
Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server Cyber Security News
Identity and Access Management Trends Shaping 2025 Cyber Security News
Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code Cyber Security News
New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News