Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks

Posted on June 20, 2025June 20, 2025 By CWS

Meta-owned WhatsApp advised SecurityWeek {that a} latest FreeType vulnerability, flagged as probably exploited on the time of disclosure, has been linked to an exploit of Israeli surveillance options supplier Paragon.

In mid-March, Meta revealed an advisory on the Fb safety advisories web page to tell customers about CVE-2025-27363, an out-of-bounds vulnerability within the FreeType open supply library that would result in arbitrary code execution. The advisory stated the vulnerability could have been exploited within the wild. 

In early Might, the flaw was patched in Android and added by the cybersecurity company CISA to its Identified Exploited Vulnerabilities (KEV) catalog. 

Nevertheless, there was no public data on the assaults exploiting CVE-2025-27363.

SecurityWeek discovered from WhatsApp this week that the CVE identifier CVE-2025-27363 was requested by its researchers after the flaw was linked to a Paragon exploit. 

The College of Toronto’s Citizen Lab analysis group reported in March {that a} WhatsApp zero-day vulnerability had been exploited in Paragon spy ware assaults. WhatsApp representatives on the time advised SecurityWeek that the zero-day assaults concerned using teams and sending PDF recordsdata, and that the weak spot had been patched on the server aspect, with out the necessity for a client-side repair.

WhatsApp has now revealed that CVE-2025-27363 was found throughout an investigation into different potential channels — exterior of WhatsApp — that menace actors resembling spy ware companies could also be utilizing to ship malware. 

WhatsApp stated it shared its findings with others to assist improve defenses throughout the trade.Commercial. Scroll to proceed studying.

FreeType is a improvement library designed for rendering textual content onto bitmaps, and gives help for different font-related operations. Within the case of CVE-2025-27363, which impacts FreeType 2.13.0 and earlier, Meta stated the difficulty is triggered when “making an attempt to parse font subglyph constructions associated to TrueType GX and variable font recordsdata”. 

“The susceptible code assigns a signed quick worth to an unsigned lengthy after which provides a static worth inflicting it to wrap round and allocate too small of a heap buffer. The code then writes as much as 6 signed lengthy integers out of bounds relative to this buffer,” Meta defined in its advisory. “This may increasingly end in arbitrary code execution.”

Citizen Lab has discovered proof that Paragon’s Graphite spy ware has been utilized in nations resembling Australia, Canada, Denmark, Italy, Cyprus, Singapore, and Israel. 

Paragon is understood for creating refined exploits that don’t require any interplay from the focused consumer. Citizen Lab discovered indications that the corporate was till just lately capable of hack up-to-date iPhones. Apple has since patched the exploited vulnerability. 

Associated: Google Ships Android ‘Superior Safety’ Mode to Thwart Surveillance Spy ware

Associated: Spy ware Maker NSO Ordered to Pay $167 Million Over WhatsApp Hack

Associated: Android Zero-Day Exploited in Spy ware Campaigns, Amnesty Worldwide Factors to Cellebrite

Security Week News Tags:Attacks, Exploited, FreeType, Meta, Paragon, Spyware, ZeroDay

Post navigation

Previous Post: 6 Steps to 24/7 In-House SOC Success
Next Post: Motors Theme Vulnerability Exploited to Hack WordPress Websites

Related Posts

Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 Security Week News
Zero Networks Raises $55 Million for Microsegmentation Solution Security Week News
Misconfigured HMIs Expose US Water Systems to Anyone with a Browser Security Week News
364,000 Impacted by Data Breach at LexisNexis Risk Solutions Security Week News
FBI Warns of Deepfake Messages Impersonating Senior Officials Security Week News
Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
  • Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • Godfather Android Trojan Creates Sandbox on Infected Devices
  • Motors Theme Vulnerability Exploited to Hack WordPress Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
  • Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • Godfather Android Trojan Creates Sandbox on Infected Devices
  • Motors Theme Vulnerability Exploited to Hack WordPress Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News