Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New bug in SAP NetWeaver allows attackers to take over servers without logging in

Coinbase expands investment in India’s CoinDCX, with exchange value of $2.45 billion

Sam Altman says ChatGPT will soon allow erotica for adult users

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Apple Patches CVE-2025-43300 Zero Day for iOS, iPados and Macos
Identity

Apple Patches CVE-2025-43300 Zero Day for iOS, iPados and Macos

userBy userAugust 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 21, 2025Ravi LakshmananVulnerability/Zero Day

Apple has released security updates to address security flaws affecting iOS, iPados and MacOS, saying it is undergoing active exploitation in the wild.

The zero-day outbound write vulnerability tracked as CVE-2025-43300 lies in the Imageio framework that can result in memory corruption when processing malicious images.

“Apple is aware of reports that this issue may have been exploited in a highly sophisticated attack on a particular targeted individual,” the company said in its recommendation.

The iPhone maker said the bug was discovered internally and the boundary checking was improved and addressed. The following versions address security flaws –

iOS 18.6.2 and iPads 18.6.2 – iPhone XS and then iPad Pro 13″ and later, iPad Pro 12.9″ 3rd generation and later, iPad Pro 11″ 1st generation and later, iPad Air 3rd Generation and later, iPad 7th generation and later, iPad Mini 5th Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Pro Mini 5th generation and iPad Mini 5th generation and later iPad Pro 7th generation and 6th generation MacOS Ventura 13.7.8 – Macs Runing Macos Ventura Macos Sonoma 14.7.8 – Mac Runing Macos Sonoma Macos Sequoia

Cybersecurity

It is currently unknown who was behind the attack and who was targeted, but the vulnerability could be weaponized as part of a highly targeted attack.

With the latest update, Apple has fixed a total of seven zero-days so far: CVE-2025-24085, CVE-2025-24200, CVE-2025-24201, CVE-2025-31200, CVE-2025-31201 and CVE-2025-43200, CVE-2025-24085, CVE-2025-24201: CVE-2025-2425-24201: CVE-2025-2425-24201, CVE-2025-2425-24201, and CVE-2025-43200.

Last month, the company issued a patch for a vulnerability in Safari that exists in an open source component (CVE-2025-6558) that Google reportedly exploited as zero-day in a Chrome web browser.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSmarter Healthcare Starts Now: The Power of Integrated Medical Devices
Next Article Exploring the importance of helium recycling
user
  • Website

Related Posts

New bug in SAP NetWeaver allows attackers to take over servers without logging in

October 15, 2025

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New bug in SAP NetWeaver allows attackers to take over servers without logging in

Coinbase expands investment in India’s CoinDCX, with exchange value of $2.45 billion

Sam Altman says ChatGPT will soon allow erotica for adult users

At Starbase, SpaceX is doing its own firefighting.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.