Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Security Breaches and Vulnerabilities: A Deluge of Cyber Threats


Apple has recently announced that it has backported patches for a zero-day vulnerability tracked as CVE-2025-43300, which was found to be actively exploited in recent attacks. This highlights the ongoing threat landscape and the importance of keeping software up-to-date with the latest security patches.

  • Apple has backported patches for a zero-day vulnerability tracked as CVE-2025-43300, which was actively exploited in recent attacks.
  • The company had previously addressed this issue by releasing updates in August 2025 but decided to backport the patches due to rapidly evolving cyber threats.
  • Updated releases include iOS 18.6.2, iPadOS 17.7.10, macOS Ventura 13.7.8, and other versions of iOS, iPadOS, and macOS.
  • Ackers chained CVE-2025-43300 with CVE-2025-55177 in spyware campaigns targeting fewer than 200 people.
  • Apple has also backported patches for an additional vulnerable version of CVE-2025-43300, applicable to older versions of iOS, iPadOS, and macOS.



  • Apple has recently announced that it has backported patches for a zero-day vulnerability tracked as CVE-2025-43300, which was found to be actively exploited in recent attacks. This vulnerability is an out-of-bounds write issue residing in the ImageIO framework, allowing attackers to cause memory corruption when processing malicious images.

    The company had previously addressed this issue in August 2025 by releasing updates for iOS, iPadOS, and macOS. However, due to the rapidly evolving nature of cyber threats, Apple has now decided to backport these patches to provide additional protection for its users. The updated releases include:

    - iOS 18.6.2 and iPadOS 18.6.2 - applicable to iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later
    - iPadOS 17.7.10 - applicable to iPad Pro 12.9-inch 2nd generation, iPad Pro 10.5-inch, and iPad 6th generation
    - macOS Ventura 13.7.8 - applicable to Mac systems running macOS Ventura
    - macOS Sonoma 14.7.8 - applicable to Macs systems running macOS Sonoma
    - macOS Sequoia 15.6.1 - applicable to Macs systems running macOS Sequoia

    Furthermore, WhatsApp recently confirmed that attackers had chained CVE-2025-55177 with CVE-2025-43300 in spyware campaigns targeting fewer than 200 people. This highlights the ongoing threat landscape and the importance of keeping software up-to-date.

    Additionally, Apple has also recently backported patches to address another actively exploited vulnerability tracked as CVE-2025-43300, which was initially found in August 2025. These patches have been released for older versions of iOS, iPadOS, and macOS, including:

    - iOS 16.7.12 and iPadOS 16.7.12 - applicable to iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation
    - iOS 15.8.5 and iPadOS 15.8.5 - applicable to iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)

    In conclusion, the recent announcement by Apple regarding the backporting of patches for CVE-2025-43300 highlights the rapidly evolving nature of cyber threats. It is essential for individuals to keep their software up-to-date with the latest security patches to protect themselves from these threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Security-Breaches-and-Vulnerabilities-A-Deluge-of-Cyber-Threats-ehn.shtml

  • https://securityaffairs.com/182283/security/apple-backports-fix-for-actively-exploited-cve-2025-43300.html


  • Published: Wed Sep 17 01:20:23 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us