PT-2025-34177 · Apple · Macos Ventura +5
Published
2025-08-20
·
Updated
2025-08-26
·
CVE-2025-43300
10
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
Apple iOS, iPadOS, and macOS versions 17.7.10 through 18.6.2, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, and macOS Ventura 13.7.8.
**Description:**
An out-of-bounds write vulnerability exists in the ImageIO framework, a core component responsible for processing image files. Processing a maliciously crafted image file may result in memory corruption, potentially allowing an attacker to execute arbitrary code. Apple is aware of reports indicating this vulnerability (CVE-2025-43300) has been actively exploited in highly sophisticated, targeted attacks. These attacks may involve zero-click exploitation, meaning no user interaction is required beyond receiving the malicious image. Reports suggest the vulnerability has been used to target individuals with cryptocurrency holdings.
**Recommendations:**
- Update iOS to version 18.6.2 or later.
- Update iPadOS to version 18.6.2 or 17.7.10.
- Update macOS Sequoia to version 15.6.1.
- Update macOS Sonoma to version 14.7.8.
- Update macOS Ventura to version 13.7.8.
- Avoid opening images from untrusted sources.
- Disable auto-download of images in applications like Telegram and iMessage.
Fix
RCE
Memory Corruption
Weakness Enumeration
Related Identifiers
Affected Products
References · 382
- https://support.apple.com/en-us/124925 · Security Note, Vendor Advisory
- https://bdu.fstec.ru/vul/2025-10189 · Security Note
- https://support.apple.com/en-us/124926 · Security Note, Vendor Advisory
- https://support.apple.com/en-us/124927 · Security Note, Vendor Advisory
- https://support.apple.com/en-us/124929 · Security Note, Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-43300 · Security Note
- https://support.apple.com/en-us/124928 · Security Note, Vendor Advisory
- https://twitter.com/RiiixEth/status/1959205618268656023 · Twitter Post
- https://twitter.com/grok/status/1958596654325801284 · Twitter Post
- https://twitter.com/gioco36639/status/1958938851193274736 · Twitter Post
- https://twitter.com/johndjohnson/status/1958894213233336471 · Twitter Post
- https://twitter.com/supremebeme/status/1959372792211898862 · Twitter Post
- https://twitter.com/grok/status/1958617820834799933 · Twitter Post
- https://t.me/CyberSecurityTechnologies/12288 · Telegram Post
- https://twitter.com/grok/status/1959091202021892164 · Twitter Post