Loading HuntDB...

CVE-2025-43200

MEDIUM
Published 2025-06-16T21:36:25.578Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-43200. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
4.8
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.008
probability
of exploitation in the wild

There is a 0.8% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.723
Higher than 72.3% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
LOW
Integrity
LOW
Availability
NONE

Description

This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Available Exploits

No exploits available for this CVE.

Related News

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-43200 Apple Multiple Products Unspecified Vulnerability CVE-2023-33538 TP-Link Multiple Route…

Cisa.gov 2025-06-16 12:00
Apple Products Security Restriction Bypass Vulnerability

A vulnerability was identified in Apple Products. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. Note: For CVE-2025-43200, a logic issue existed when processing a maliciously crafted phot…

Hkcert.org 2025-06-16 01:00
iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)

A zero-click attack leveraging a freshly disclosed Messages vulnerability (CVE-2025-43200) has infected the iPhones of two European journalists with Paragon’s Graphite mercenary spyware, Citizen Lab researchers have revealed on Thursday. The attacks happened …

Help Net Security 2025-06-13 12:06
Apple confirmed that Messages app flaw was actively exploited in the wild

Apple confirmed that a security flaw in its Messages app was actively exploited in the wild to target journalists with Paragon’s Graphite spyware. Apple confirmed that a now-patched vulnerability, tracked as CVE-2025-43200, in its Messages app was actively ex…

Securityaffairs.com 2025-06-13 10:15
Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Apple has disclosed that a now-patched security flaw present in its Messages app was actively exploited in the wild to target civil society members in sophisticated cyber attacks. The vulnerability, tracked as CVE-2025-43200, was addressed on February 10, 202…

Internet 2025-06-13 07:03

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

July 7, 2025

Added to KEV

June 16, 2025

Required Action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: Apple
Product: Multiple Products

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.06.16 Released: June 16, 2025

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

Not EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Affected Products (ENISA)

apple
ios and ipados

ENISA Scoring

CVSS Score (3.1)

4.8
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS Score

0.330
probability

Data provided by ENISA EU Vulnerability Database. Last updated: July 30, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed MODERATE

GHSA-whff-4x34-r5vx

Advisory Details

This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Advisory provided by GitHub Security Advisory Database. Published: June 17, 2025, Modified: June 17, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

4 posts
Reddit 1 month ago
crstux
Exploit

🔥 Top 10 Trending CVEs (06/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2023-52927](https://nvd.nist.gov/vuln/detail/CVE-2023-52927)** - 📝 In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from …

2
2.0
View Original High Risk
Reddit 1 month ago
crstux
Exploit

🔥 Top 10 Trending CVEs (05/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-6491](https://nvd.nist.gov/vuln/detail/CVE-2025-6491)** - 📝 n/a - 📈 **CVSS:** 0 - 🧭 **Vector:** n/a - ⚠️ **Priority:** n/a - 📝 **Analysis:** No Information available for this CVE at the moment. --- **2. [CVE-2025-49826](https://nvd.nist.gov/vuln/detail/CVE-2025-49826)** …

1
1.0
View Original High Risk
Reddit 1 month ago
crstux
Exploit

🔥 Top 10 Trending CVEs (04/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-41646](https://nvd.nist.gov/vuln/detail/CVE-2025-41646)** - 📝 An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device - …

1
1.0
View Original High Risk
Reddit 1 month, 1 week ago
---Satella---

🚨 تنبيه أمني خطير لمستخدمي أجهزة آبل (iPhone و iPad)! 🚨 يا جماعة الخير، تم اكتشاف ثغرة أمنية خطيرة جدًا تحت رقم CVE-2025-43200، تستهدف أجهزة iOS و iPadOS. وش تسوي الثغرة؟ هاكرز يقدرون يرسلون لك رسالة على تطبيق iMessage، ممكن تكون صورة، ملف، أو حتى رابط، وداخلها أكواد خبيثة تخترق …

21
35
91.0

References

Published: 2025-06-16T21:36:25.578Z
Last Modified: 2025-07-28T19:41:41.673Z
Copied to clipboard!