CVE-2025-43300 is an out-of-bounds write vulnerability in Apple's Image I/O framework affecting macOS, iOS, and iPadOS that requires user interaction to process a malicious image file. While actively exploited as a zero-day, it primarily affects client-side operating systems rather than internet-facing server applications.
Data Source: CIRCL
Confidence: HIGH
Exploitation Method: USER_INTERACTION
CVE Published: 2025-08-21
Added to CISA KEV: 2025-08-21 0 DAY BETWEEN CVE AND KEV
The vulnerability, catalogued as CVE-2025-43300, represents a serious security flaw within Appleโs Image I/O framework, which handles image processing across iOS, iPadOS, and macOS platforms.
The flaw, identified as CVE-2025-43300, is already being actively exploited in highly targeted attacks. The patches, delivered as iOS 18.6.2 and iPadOS 18.6.2, correct a memory corruption issue that can be triggered when a device processes a specially crafted image file.
Missing: internet- facing
CVE-2025-43300 represents a continuation of Appleโs ongoing challenges with image processing security. The vulnerability highlights how the complexity of modern file formats, particularly when multiple standards interact (TIFF containers with JPEG data), can create unexpected attack surfaces.
Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.