Loading HuntDB...

CVE-2025-43300

HIGH
Published 2025-08-21T00:27:21.442Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-43300. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
8.8
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Available Exploits

No exploits available for this CVE.

Related News

Apple addressed the seventh actively exploited zero-day

Apple addressed a vulnerability impacting iOS, iPadOS, and macOS that it is under active exploitation in the wild. Apple addressed an actively exploited zero-day, tracked as CVE-2025-43300, in iOS, iPadOS, and macOS. The vulnerability is zero-day out-of-bound…

Securityaffairs.com 2025-08-21 16:54
All Apple users should update after company patches zero-day vulnerability in all platforms

Apple has released security updates to patch a zero-day vulnerability tracked as CVE-2025-43300 for all platforms

Malwarebytes.com 2025-08-21 12:04
CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-43300 Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability These types of vulnerab…

Cisa.gov 2025-08-21 12:00
Apple issues urgent iOS update: Here’s why you shouldn’t ignore iOS 18.6.2 release for iPhones, iPads, and Macs

Apple has issued a security upgrade for iOS 18, iPadOS 18, and macOS. The update addresses a critical vulnerability, CVE-2025-43300. It impacts iPhone XS and later, several iPad Pro, iPad Air, and iPad mini models. The vulnerability involves an out-of-bounds …

The Times of India 2025-08-21 08:19
Apple Patches CVE-2025-43300 Zero-Day in iOS, iPadOS, and macOS Exploited in Targeted Attacks

Apple has released security updates to address a security flaw impacting iOS, iPadOS, and macOS that it said has come under active exploitation in the wild. The zero-day out-of-bounds write vulnerability, tracked as CVE-2025-43300, resides in the ImageIO fram…

Internet 2025-08-21 04:47

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

On Track

Due Date

September 11, 2025 (19 days remaining)

Added to KEV

August 21, 2025

Required Action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: Apple
Product: iOS, iPadOS, and macOS

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.08.21 Released: August 21, 2025

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

Not EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Affected Products (ENISA)

apple
macos

ENISA Scoring

EPSS Score

0.020
probability

Data provided by ENISA EU Vulnerability Database. Last updated: August 21, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-cpwx-wfp4-x368

Advisory Details

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2 and iPadOS 18.6.2. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: August 21, 2025, Modified: August 21, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

19 posts
Reddit 8 hours, 22 minutes ago
Suspicious_Bug4112
Exploit

Apple Fixes Zero-Day Vulnerability Targeting Crypto Users **Date:** 22-Aug-25 Apple has released critical security updates for iOS and macOS to address a zero-day vulnerability, CVE-2025-43300, in its ImageIO framework, which could allow remote code execution through malicious images, particularly targeting cryptocurrency users. This zero-click exploit poses significant risks, especially for …

1
1.0
View Original High Risk
Reddit 10 hours, 26 minutes ago
_cybersecurity_
Exploit

CISA Issues Urgent Patch Warning for Apple Zero-Day Vulnerability **A new vulnerability affecting Apple devices has been identified, leading CISA to mandate an immediate patch for federal agencies.** **Key Points:** - CISA identified a zero-day vulnerability rated 8.8 in severity affecting Apple's ImageIO framework. - The vulnerability allows exploitation via …

2
1
4.0
View Original High Risk
Reddit 16 hours, 57 minutes ago
crstux
Exploit

🔥 Top 10 Trending CVEs (22/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-54336](https://nvd.nist.gov/vuln/detail/CVE-2025-54336)** - 📝 In Plesk Obsidian 18.0.70, _isAdminPasswordValid uses an == comparison. Thus, if the correct password is 0e followed by any digit string, then an attacker can login with any …

1
1.0
View Original High Risk
Reddit 20 hours, 56 minutes ago
_cybersecurity_

New iOS and macOS Vulnerability Added to CISA's Alert List **CISA has identified a recently exploited vulnerability in Apple's software that poses high risks to users and organizations.** **Key Points:** - CVE-2025-43300 relates to an out-of-bounds write vulnerability in Apple iOS, iPadOS, and macOS. - This vulnerability is part of …

Reddit 21 hours, 49 minutes ago
Immediate_Gold9789
Exploit

CyberDudeBivash ThreatWire – 21st Edition Why GPUs, NPUs, and AI Accelerators Are Now High-Value Targets By CyberDudeBivash | www.cyberdudebivash.com https://preview.redd.it/a2f3itpa8ikf1.png?width=1536&format=png&auto=webp&s=26899944cca46c6b9f5d1f275a90a8a98c8c606e Author : Cyberdudebivash , [cryptobivash.code.blog](https://www.blogger.com/blog/post/edit/2163240462341298251/8732815097835803749?hl=en#) ,[www.cyberdudebivash.com](https://www.blogger.com/blog/post/edit/2163240462341298251/8732815097835803749?hl=en#), [cyberbivash.blogspot.com](https://www.blogger.com/blog/post/edit/2163240462341298251/8732815097835803749?hl=en#) # Executive Summary For decades, central processing units (CPUs) were the primary battleground for exploit developers, malware authors, and nation-state threat actors. But …

1
1.0
View Original High Risk
Reddit 22 hours, 27 minutes ago
Immediate_Gold9789
Exploit

CyberDudeBivash Global CVEs Analysis Report — 22 August 2025 https://preview.redd.it/9hkbzarj1ikf1.png?width=1024&format=png&auto=webp&s=6f4223650d8526119e4b88925df35e8e3f42ccde # Executive Overview As of **22 August 2025**, the global vulnerability landscape exhibits escalating volatility. Multiple high-severity CVEs have emerged across browsers, operating systems, AI platforms, and network infrastructure—many actively exploited and posing catastrophic risks to enterprise security. This **Global …

1
1.0
View Original High Risk
Reddit 23 hours, 35 minutes ago
Immediate_Gold9789
Exploit Payload

CyberDudeBivash Critical Alert Apple ImageIO Zero-Day (CVE-2025-43300): Memory Corruption from Malicious Images https://preview.redd.it/ebgzo2ncphkf1.png?width=1024&format=png&auto=webp&s=c625f369d53430980a27e1a54f783bd0e3311f05 # Executive Summary Apple has released an emergency patch to address **CVE‑2025‑43300**, an **out-of-bounds write vulnerability in the ImageIO framework**, which processes image files across iOS, iPadOS, and macOS. Experts warn this flaw has been exploited in …

1
1.0
View Original High Risk
Reddit 1 day, 6 hours ago
RedPacketSecurity

CVE Alert: CVE-2025-43300 – Apple – macOS

Reddit 1 day, 8 hours ago
rareQWERTY

Apple Fixes ImageIO Bug Exploited in Real Attacks (CVE-2025-43300)

Reddit 1 day, 8 hours ago
falconupkid
Exploit Payload

SecOpsDaily - 2025-08-21 Roundup Highlights from today: - [Threat Intel] [Malicious Go Module Disguised as SSH Brute Forcer Exfiltrates Credentials via Telegram](https://socket.dev/blog/malicious-go-module-disguised-as-ssh-brute-forcer-exfiltrates-credentials?utm_medium=feed) - [Vendor Advisory] [Think before you Click(Fix): Analyzing the ClickFix social engineering technique](https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/) - [News] [Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks](https://thehackernews.com/2025/08/pre-auth-exploit-chains-found-in.html) - …

Also mentions: CVE-2025-9074
1
1.0
View Original High Risk

References

Published: 2025-08-21T00:27:21.442Z
Last Modified: 2025-08-22T03:55:38.332Z
Copied to clipboard!