WhatsApp Zero-Day Vulnerability Exploited in 0-Click Attacks To Hack Apple Devices
The flaw, when chained with an Apple operating system vulnerability (CVE-2025-43300),
According to WhatsApp’s security advisory, the primary flaw (CVE-2025-55177) stemmed from “incomplete authorization of linked device synchronization messages” affecting multiple versions of its applications:
Exploitation of the bug allowed a malicious actor to remotely trigger the processing of content from arbitrary URLs on a target’s device, with no clicks or user interaction required — a hallmark of so‑called zero‑click exploits.
The impact was significantly worsened when attackers combined the WhatsApp flaw with CVE-2025-43300, a previously disclosed out-of-bounds write vulnerability in Apple’s ImageIO framework.
The Apple vulnerability , residing deep within a core image-handling library, could lead to memory corruption and enable unauthorized access to device data.
Amnesty International’s Security Lab is deeply engaged in probing this incident, focusing on cases involving multiple targeted individuals.
Preliminary findings indicate the attack affects both iPhone and Android users, with civil society members particularly journalists and human rights defenders among the victims.
The persistent use of government spyware against these groups remains a significant concern.A critical detail from the investigation is that the Apple vulnerability (CVE-2025-43300) lies within a core image library, suggesting it could be exploited through apps beyond WhatsApp.
Apple had patched CVE-2025-43300 earlier, confirming that it was being used in “extremely sophisticated attacks against specific targeted individuals.”
The pairing of these two flaws enabled attackers to weaponize malicious messages against high-value targets.
WhatsApp confirmed it had proactively notified targeted users who may have received the malicious messages. Notifications warned recipients that attackers may have accessed “device contents, including sensitive messages,” by chaining WhatsApp and OS-level vulnerabilities.
While WhatsApp clarified it cannot verify with certainty whether every alerted account was successfully compromised, it stressed that the risk of device data compromise was real and substantial.
WhatsApp announced that it had rolled out server-side and client-side mitigations to block this attack vector in the latest app updates.
However, it emphasized that vulnerabilities at the OS level remain a risk, meaning that users must also update their Apple devices with the latest iOS, iPadOS, and macOS security patches.
The company urged users to enable advanced device protection features, such as:
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post WhatsApp Zero-Day Vulnerability Exploited in 0-Click Attacks To Hack Apple Devices appeared first on Cyber Security News.
Featuring a character dressed like Link and a creature that looks like Pikachu, upcoming Steam…
It’s Mario Day (MAR10), and LEGO is celebrating by announcing a new Mario Kart LEGO…
Boring filler quests, often of the "fetch" variety, used to be derided – but in…
Rachel Johnson pushes her daughter Harper, 3, on a swing during the warm weather in…
SHELD facility topic of Knew Your Town in South Hadley SOUTH HADLEY — Know Your…
50 Years Ago A local chapter of the Inventors Club of America, Inc., is being…
This website uses cookies.