Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks

Posted on June 20, 2025June 20, 2025 By CWS

Meta-owned WhatsApp advised SecurityWeek {that a} latest FreeType vulnerability, flagged as probably exploited on the time of disclosure, has been linked to an exploit of Israeli surveillance options supplier Paragon.

In mid-March, Meta revealed an advisory on the Fb safety advisories web page to tell customers about CVE-2025-27363, an out-of-bounds vulnerability within the FreeType open supply library that would result in arbitrary code execution. The advisory stated the vulnerability could have been exploited within the wild. 

In early Might, the flaw was patched in Android and added by the cybersecurity company CISA to its Identified Exploited Vulnerabilities (KEV) catalog. 

Nevertheless, there was no public data on the assaults exploiting CVE-2025-27363.

SecurityWeek discovered from WhatsApp this week that the CVE identifier CVE-2025-27363 was requested by its researchers after the flaw was linked to a Paragon exploit. 

The College of Toronto’s Citizen Lab analysis group reported in March {that a} WhatsApp zero-day vulnerability had been exploited in Paragon spy ware assaults. WhatsApp representatives on the time advised SecurityWeek that the zero-day assaults concerned using teams and sending PDF recordsdata, and that the weak spot had been patched on the server aspect, with out the necessity for a client-side repair.

WhatsApp has now revealed that CVE-2025-27363 was found throughout an investigation into different potential channels — exterior of WhatsApp — that menace actors resembling spy ware companies could also be utilizing to ship malware. 

WhatsApp stated it shared its findings with others to assist improve defenses throughout the trade.Commercial. Scroll to proceed studying.

FreeType is a improvement library designed for rendering textual content onto bitmaps, and gives help for different font-related operations. Within the case of CVE-2025-27363, which impacts FreeType 2.13.0 and earlier, Meta stated the difficulty is triggered when “making an attempt to parse font subglyph constructions associated to TrueType GX and variable font recordsdata”. 

“The susceptible code assigns a signed quick worth to an unsigned lengthy after which provides a static worth inflicting it to wrap round and allocate too small of a heap buffer. The code then writes as much as 6 signed lengthy integers out of bounds relative to this buffer,” Meta defined in its advisory. “This may increasingly end in arbitrary code execution.”

Citizen Lab has discovered proof that Paragon’s Graphite spy ware has been utilized in nations resembling Australia, Canada, Denmark, Italy, Cyprus, Singapore, and Israel. 

Paragon is understood for creating refined exploits that don’t require any interplay from the focused consumer. Citizen Lab discovered indications that the corporate was till just lately capable of hack up-to-date iPhones. Apple has since patched the exploited vulnerability. 

Associated: Google Ships Android ‘Superior Safety’ Mode to Thwart Surveillance Spy ware

Associated: Spy ware Maker NSO Ordered to Pay $167 Million Over WhatsApp Hack

Associated: Android Zero-Day Exploited in Spy ware Campaigns, Amnesty Worldwide Factors to Cellebrite

Security Week News Tags:Attacks, Exploited, FreeType, Meta, Paragon, Spyware, ZeroDay

Post navigation

Previous Post: 6 Steps to 24/7 In-House SOC Success
Next Post: Motors Theme Vulnerability Exploited to Hack WordPress Websites

Related Posts

Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment Security Week News
LevelBlue to Acquire Trustwave to Create Major MSSP Security Week News
EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules Security Week News
Reach Security Raises $10 Million for Exposure Management Solution Security Week News
Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability Security Week News
Cisco Warns of Hardcoded Credentials in Enterprise Software Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures
  • Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data
  • CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS
  • AI Is Transforming Cybersecurity Adversarial Testing
  • Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures
  • Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data
  • CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS
  • AI Is Transforming Cybersecurity Adversarial Testing
  • Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News