Extraordinary updates for iOS, iPadOS, and macOS: a flaw in ImageIO allows remote code execution just by processing an image.
Apple has released iOS/iPadOS 18.6.2 and updates for macOS, confirming exploits in the wild. The impact on user security is significant, especially for those managing wallet crypto.
The industry analysts we collaborate with observe that decoding vulnerabilities like those in ImageIO are often used in targeted campaigns against high-value users (e.g., portfolio operators, journalists, managers).
According to data collected from official security feeds and technical reports updated as of August 25, 2025, public information remains limited, and complete IOCs have not been made available.
The vulnerability, cataloged as CVE‑2025‑43300, affects the ImageIO framework, which handles the decoding of numerous graphic formats on iPhone, iPad, and Mac.
In the security bulletin for iOS/iPadOS 18.6.2 (released on August 21, 2025), Apple specifies that the flaw has been corrected and that “it is aware of reports of active exploits”.
An independent analysis by Qualys published the first technical details on August 21, 2025, judging the criticality as high. An interesting aspect is the breadth of the attack surface.
In summary: the corrective updates were released on August 21, 2025; investigations continue and the exploit chain can be initiated by parsing an image file in zero‑click or near-zero scenarios.
The flaw is an out‑of‑bounds write type in ImageIO. A specially crafted image can corrupt memory and be exploited to execute arbitrary code with the privileges of the process handling it. The exact vector has not been publicly described, but the most plausible surfaces include:
This makes the attack potentially zero‑interaction, a rare and, it must be said, dangerous combination on mobile platforms.
Attackers often focus on user behaviors. Screenshots of seed phrase, private keys, or QR codes stored in the camera roll can be extracted with OCR and recognition tools.
If the exploit allows access to local data or bypasses permissions, the transition from the device to the funds can be very rapid. In this context, elements that increase the risk are:
At the moment, there are no specific public Indicators of Compromise (IOC) for CVE‑2025‑43300. However, some prudent signals and checks include:
In the absence of public IOCs, the priority remains the installation of updates and the reduction of exposure of sensitive data. It must be said that isolated clues are not enough to confirm a compromise.
In recent months, several zero-day vulnerabilities have been fixed on iOS and macOS. Even when the fix arrives quickly, the distribution and installation times open a window of risk.
For those who safeguard digital assets, the most prudent approach combines timely updates with practices of data-minimization and key segregation. In this context, permission management remains central.
As soon as available for your device. Apple reports active exploits (bulletin of August 21, 2025), so the patch is among the current security priorities.
Substantially reduces the risk related to CVE‑2025‑43300, but the protection of funds also requires the removal of seed/keys from the camera roll, more restrictive app permissions, and, for significant amounts, the use of cold wallet.
All Apple devices that process images via ImageIO: iPhone and iPad (iOS/iPadOS) and Mac (macOS). Check in Settings > Software Update for the availability of the latest version.
Editorial note: at the moment, the Apple bulletin does not publicly display an official CVSS score nor the specific macOS build numbers for all variants; detailed IOCs or the names of the researchers who reported the flaw have not been released. We will update this section as soon as new official publications are available (last content check: August 25, 2025).


