News: 1755779175

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Apple rushes out fix for active zero-day in iOS and macOS

(2025/08/21)


Apple has shipped emergency updates to fix an actively exploited zero-day in its ImageIO framework, warning that the flaw has already been abused in targeted attacks.

Logged as [1]CVE-2025-43300 , the bug is an out-of-bounds write issue in ImageIO, the component apps rely on to read and write standard image formats. Apple warned that the flaw could let miscreants hijack devices with a booby-trapped image – and for some iDevice users, it sounds like the damage has already been done.

"Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals," Cupertino said.

[2]

Apple went on to explain that "processing a malicious image file may result in memory corruption," but didn't say what that could lead to. Typically, though, these types of flaws allow stealthy attackers to spy on users and steal sensitive data.

[3]

The company credits its own security team with the find and says it has tightened bounds checking to close the hole. Fixes landed on August 20 for iOS and iPadOS 18.6.2, macOS Sequoia 15.6.1, and the still-supported Sonoma 14.7.8 and Ventura 13.7.8, with a parallel update for older iPads on iPadOS 17.7.10.

As usual, Apple is keeping the juicy details under wraps. There's no attribution, no list of targets, and no technical write-up beyond the basics. However, the phrasing in Apple's release notes suggests the flaw has been abused by a sophisticated hacking group, potentially a spyware developer, rather than splashed about in broad criminal attacks.

[4]Google tries to trump iPhone launch with AI-powered Pixel 10 range

[5]US spy chief claims UK backed down over Apple backdoor demand

[6]Timekettle T1 AI translator helps you scale the Tower of Babel

[7]Apple piles another $100B on top of previous US manufacturing pledge

The fixes continue a bruising run of emergency updates for Apple kit this year. In June, the company [8]had to deal with another exploited zero-day , a zero-click flaw that allowed attackers to compromise devices simply by sending a malicious image or video link through iCloud. Researchers linked that attack to Paragon's Graphite spyware, which was found on the phones of at least two journalists. That bug was squashed in iOS 18.3.1 and its desktop counterparts, but only after it had already been put to work in the wild.

None of this will trouble most users, but the point of targeted operations is to make sure victims never notice. If your kit runs iOS, iPadOS, or macOS, install the latest build and move on with your day; if you are the sort of person who worries about being on the sharp end of "extremely sophisticated" attacks, you probably already have. ®

Get our [9]Tech Resources



[1] https://support.apple.com/en-us/124925

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aKdCmDSDfC_4SyVw9YR-PQAAAEI&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aKdCmDSDfC_4SyVw9YR-PQAAAEI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://www.theregister.com/2025/08/20/google_pixel_10/

[5] https://www.theregister.com/2025/08/19/uk_apple_backdoor_uturn/

[6] https://www.theregister.com/2025/08/17/timekettle_t1_ai_translator_review/

[7] https://www.theregister.com/2025/08/06/apple_pledges_another_100b_us_manufacturing/

[8] https://www.theregister.com/2025/06/13/apple_fixes_zeroclick_exploit_underpinning/

[9] https://whitepapers.theregister.com/



Not another privilege escalation due to Apple giving its own services too much access?

Charlie Clark

Running software fast and safe is hard. It gets even harder if you need hardware acceleration.

williamyf

Deployed overnight on my supported macmini. OCLP folk have that type of unattended upgrade disabled.

Will test tonight on my OCLP air, but there should be no problem, just inconvenience

sitta_europea

"... an extremely sophisticated attack ..." Cupertino said.

The more they talk about "extremely sophisticated" attacks the less I believe them.

Making use of an out-of-bounds write doesn't sound especially sophisticated to me, but I guess we'll see if and when they release some detail. Or the criminals do.

Androgynous Cupboard

There speaks a man that has never (attempted to) read ISO/IEC 15444-5:2015.

wolfetone

Ahhhh so that was the update that took my Mac 2 hours to do this morning.

I say 2 hours. I started it, had to go for an appointment, when I got back it hadn't moved even though it looked finished. Restarted it and it worked. I think.

20 mins for me

Steve Davies 3

Ok, I did it in two parts as I was originally going to apply the update tonight. After selecting that option, it downloaded the fix.

I had to go out a little later so I set it going while I went to the butchers. By the time I returned, it was done and ready to login.

Just because they are called 'forbidden' transitions does not mean that they
are forbidden. They are less allowed than allowed transitions, if you see
what I mean.
-- From a Part 2 Quantum Mechanics lecture.