CVE-2025-43300: Vulnerability in Image Handling Framework
Apple has released urgent software updates for iPhones, iPads, and Macs after identifying a zero-day security flaw that was already being exploited. The issue, cataloged as CVE-2025-43300, exists in the ImageIO framework and can cause memory corruption when specially crafted images are processed.
Active Exploitation Reported
The company confirmed that attackers had been taking advantage of the flaw in highly sophisticated campaigns aimed at a limited set of individuals. Apple explained that the bug was discovered internally and has now been corrected by strengthening bounds checking in the affected code.
Devices and Software Versions Updated
The security fix is included in the latest operating system releases, which vary depending on the device:
- iOS 18.6.2 and iPadOS 18.6.2: Available for iPhone XS and newer, iPad Pro 13-inch, iPad Pro 12.9-inch (3rd generation and above), iPad Pro 11-inch (1st generation and above), iPad Air (3rd generation and above), iPad (7th generation and newer), and iPad mini (5th generation and newer).
- iPadOS 17.7.10: For iPad Pro 12.9-inch (2nd generation), iPad Pro 10.5-inch, and iPad (6th generation).
- macOS Ventura 13.7.8: For Macs running Ventura.
- macOS Sonoma 14.7.8: For Macs running Sonoma.
- macOS Sequoia 15.6.1: For Macs running Sequoia.
Attacks Still Under Investigation
While Apple has not disclosed the origin of the attacks or the identities of those targeted, the nature of the exploitation suggests the vulnerability was being weaponized for carefully targeted intrusions. Security researchers note that this type of flaw can be particularly dangerous because malicious images can be delivered through common apps or websites.
With this release, Apple has now fixed seven zero-day vulnerabilities in 2025, following earlier patches for CVE-2025-24085, CVE-2025-24200, CVE-2025-24201, CVE-2025-31200, CVE-2025-31201, and CVE-2025-43200.
In July, the company also resolved a Safari bug (CVE-2025-6558) that stemmed from an open-source component. That issue had been uncovered by Google researchers and was already exploited in Chrome before the patch was issued.
Apple recommends that all users install the latest available updates without delay. Applying security patches promptly is one of the most reliable defenses against exploitation, especially when attackers are already abusing vulnerabilities in the wild.