Apple rushes out fix for active zero-day in iOS and macOS
- Reference: 1755779175
- News link: https://www.theregister.co.uk/2025/08/21/apple_imageio_exploit/
- Source link:
Logged as [1]CVE-2025-43300 , the bug is an out-of-bounds write issue in ImageIO, the component apps rely on to read and write standard image formats. Apple warned that the flaw could let miscreants hijack devices with a booby-trapped image – and for some iDevice users, it sounds like the damage has already been done.
"Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals," Cupertino said.
[2]
Apple went on to explain that "processing a malicious image file may result in memory corruption," but didn't say what that could lead to. Typically, though, these types of flaws allow stealthy attackers to spy on users and steal sensitive data.
[3]
The company credits its own security team with the find and says it has tightened bounds checking to close the hole. Fixes landed on August 20 for iOS and iPadOS 18.6.2, macOS Sequoia 15.6.1, and the still-supported Sonoma 14.7.8 and Ventura 13.7.8, with a parallel update for older iPads on iPadOS 17.7.10.
As usual, Apple is keeping the juicy details under wraps. There's no attribution, no list of targets, and no technical write-up beyond the basics. However, the phrasing in Apple's release notes suggests the flaw has been abused by a sophisticated hacking group, potentially a spyware developer, rather than splashed about in broad criminal attacks.
[4]Google tries to trump iPhone launch with AI-powered Pixel 10 range
[5]US spy chief claims UK backed down over Apple backdoor demand
[6]Timekettle T1 AI translator helps you scale the Tower of Babel
[7]Apple piles another $100B on top of previous US manufacturing pledge
The fixes continue a bruising run of emergency updates for Apple kit this year. In June, the company [8]had to deal with another exploited zero-day , a zero-click flaw that allowed attackers to compromise devices simply by sending a malicious image or video link through iCloud. Researchers linked that attack to Paragon's Graphite spyware, which was found on the phones of at least two journalists. That bug was squashed in iOS 18.3.1 and its desktop counterparts, but only after it had already been put to work in the wild.
None of this will trouble most users, but the point of targeted operations is to make sure victims never notice. If your kit runs iOS, iPadOS, or macOS, install the latest build and move on with your day; if you are the sort of person who worries about being on the sharp end of "extremely sophisticated" attacks, you probably already have. ®
Get our [9]Tech Resources
[1] https://support.apple.com/en-us/124925
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aKdCmDSDfC_4SyVw9YR-PQAAAEI&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aKdCmDSDfC_4SyVw9YR-PQAAAEI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[4] https://www.theregister.com/2025/08/20/google_pixel_10/
[5] https://www.theregister.com/2025/08/19/uk_apple_backdoor_uturn/
[6] https://www.theregister.com/2025/08/17/timekettle_t1_ai_translator_review/
[7] https://www.theregister.com/2025/08/06/apple_pledges_another_100b_us_manufacturing/
[8] https://www.theregister.com/2025/06/13/apple_fixes_zeroclick_exploit_underpinning/
[9] https://whitepapers.theregister.com/
Deployed overnight on my supported macmini. OCLP folk have that type of unattended upgrade disabled.
Will test tonight on my OCLP air, but there should be no problem, just inconvenience
"... an extremely sophisticated attack ..." Cupertino said.
The more they talk about "extremely sophisticated" attacks the less I believe them.
Making use of an out-of-bounds write doesn't sound especially sophisticated to me, but I guess we'll see if and when they release some detail. Or the criminals do.
There speaks a man that has never (attempted to) read ISO/IEC 15444-5:2015.
Ahhhh so that was the update that took my Mac 2 hours to do this morning.
I say 2 hours. I started it, had to go for an appointment, when I got back it hadn't moved even though it looked finished. Restarted it and it worked. I think.
20 mins for me
Ok, I did it in two parts as I was originally going to apply the update tonight. After selecting that option, it downloaded the fix.
I had to go out a little later so I set it going while I went to the butchers. By the time I returned, it was done and ready to login.
Not another privilege escalation due to Apple giving its own services too much access?
Running software fast and safe is hard. It gets even harder if you need hardware acceleration.