Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File

Posted on September 29, 2025September 29, 2025 By CWS

WhatsApp 0-click distant code execution (RCE) vulnerability affecting Apple’s iOS, macOS, and iPadOS platforms, detailed with a proof of idea demonstration.

The assault chain exploits two distinct vulnerabilities, recognized as CVE-2025-55177 and CVE-2025-43300, to compromise a goal system with out requiring consumer interplay.

The exploit, demonstrated in a proof-of-concept (PoC) shared by the DarkNavyOrg researchers, is initiated by sending a specifically crafted malicious (DNG) picture file to a sufferer’s WhatsApp account.

As a “zero-click” assault, the vulnerability is triggered mechanically upon receipt of the malicious message, making it notably harmful as victims haven’t any alternative to stop the compromise.

0-click Assault PoC WhatsApp

WhatsApp 0-Click on Vulnerability Exploit Chain

The assault’s entry level is CVE-2025-55177, a vital logic flaw inside WhatsApp’s dealing with of messages.

Based on DarkNavyOrg, the vulnerability stems from a lacking validation examine to verify that an incoming message originates from a reputable linked system.

This oversight permits an attacker to ship a message that seems to be from a trusted supply, bypassing preliminary safety checks and delivering the malicious payload.

We triggered WhatsApp 0-click on iOS/macOS/iPadOS.CVE-2025-55177 arises from lacking validation that the [Redacted] message originates from a linked system, enabling specifically crafted DNG parsing that triggers CVE-2025-43300.Evaluation of Samsung CVE-2025-21043 can be ongoing. pic.twitter.com/idwZXqh5WK— DARKNAVY (@DarkNavyOrg) September 28, 2025

As soon as the message is delivered, the second vulnerability, CVE-2025-43300, is triggered. This flaw resides within the software’s DNG file parsing library.

The attacker crafts a malformed DNG picture that, when processed by WhatsApp, causes a reminiscence corruption error, resulting in distant code execution.

The proof-of-concept shared by the researchers reveals a script that automates the method: logging into WhatsApp, producing the malformed DNG, and sending the payload to a goal cellphone quantity. This mixture permits for a seamless and silent compromise of the focused system.

This zero-click RCE vulnerability poses a extreme risk to customers of WhatsApp on a number of Apple gadgets, together with iPhones, Mac computer systems, and iPads.

A profitable exploit may grant an attacker full management over a tool, enabling them to entry delicate information, monitor communications, and deploy additional malware. The stealthy nature of the assault means a tool may very well be compromised with none seen indicators.

The invention highlights the continuing safety challenges related to complicated file codecs and cross-platform messaging purposes. Flaws in file parsers have traditionally been a typical vector for RCE exploits, as they course of untrusted exterior information.

DarkNavyOrg has indicated that its evaluation is ongoing, together with a separate investigation right into a Samsung-related vulnerability (CVE-2025-21043).

For now, WhatsApp customers are suggested to make sure their purposes and working methods are all the time up to date to the newest variations to obtain safety patches as quickly as they change into obtainable. Each WhatsApp and Apple are anticipated to handle these vital vulnerabilities in upcoming safety updates.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.


Cyber Security News Tags:0click, DNG, Exploited, File, Malicious, Vulnerability, WhatsApp

Post navigation

Previous Post: SUSE Rancher Vulnerabilities Let Attackers Lockout the Administrators Account
Next Post: Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention

Related Posts

New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets Cyber Security News
A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection Cyber Security News
Internet Archive Abused for Hosting Stealthy JScript Loader Malware Cyber Security News
Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Cyber Security News
0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets Cyber Security News
CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark