PT-2025-34177 · Apple · Macos Sonoma +5

Published

2025-08-20

·

Updated

2025-12-31

·

CVE-2025-43300

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Apple iOS, iPadOS, and macOS versions prior to 18.6.2, 17.7.10, and 15.6.1 (Sequoia), 14.7.8 (Sonoma), and 13.7.8 (Ventura)
Description Apple addressed a zero-day vulnerability (CVE-2025-43300) in the ImageIO framework, which allows for remote code execution (RCE) via a maliciously crafted image file. This vulnerability has been actively exploited in targeted attacks, potentially leading to memory corruption and complete device compromise without user interaction. The flaw is an out-of-bounds write issue that can be triggered simply by processing a malicious image, even without opening it. Reports indicate that this vulnerability has been used in sophisticated attacks, potentially targeting high-value individuals and cryptocurrency wallets. The vulnerability affects iOS, iPadOS, and macOS.
Recommendations Update all affected Apple devices to the latest versions: iOS 18.6.2, iPadOS 18.6.2 or 17.7.10, and macOS Sequoia 15.6.1, Sonoma 14.7.8, or Ventura 13.7.8. Disable auto-download of images in apps like Telegram and iMessage as a temporary workaround. Consider using hardware wallets for cryptocurrency storage.

Exploit

Fix

RCE

DoS

Memory Corruption

Weakness Enumeration

Related Identifiers

BDU:2025-10189
CVE-2025-43300

Affected Products

Apple Macos
Ios
Ipados
Macos Sequoia
Macos Sonoma
Macos Ventura