Extraordinary updates for iOS, iPadOS, and macOS: a vulnerability in ImageIO allows remote code execution.Extraordinary updates for iOS, iPadOS, and macOS: a vulnerability in ImageIO allows remote code execution.

Apple fixes the zero‑day ImageIO (CVE‑2025‑43300): code execution from images, alert for crypto wallets

2025/08/25 21:57

Extraordinary updates for iOS, iPadOS, and macOS: a flaw in ImageIO allows remote code execution just by processing an image.

Apple has released iOS/iPadOS 18.6.2 and updates for macOS, confirming exploits in the wild. The impact on user security is significant, especially for those managing wallet crypto.

The industry analysts we collaborate with observe that decoding vulnerabilities like those in ImageIO are often used in targeted campaigns against high-value users (e.g., portfolio operators, journalists, managers).

According to data collected from official security feeds and technical reports updated as of August 25, 2025, public information remains limited, and complete IOCs have not been made available.

What we know so far (recently)

The vulnerability, cataloged as CVE‑2025‑43300, affects the ImageIO framework, which handles the decoding of numerous graphic formats on iPhone, iPad, and Mac.

In the security bulletin for iOS/iPadOS 18.6.2 (released on August 21, 2025), Apple specifies that the flaw has been corrected and that “it is aware of reports of active exploits”.

An independent analysis by Qualys published the first technical details on August 21, 2025, judging the criticality as high. An interesting aspect is the breadth of the attack surface.

In summary: the corrective updates were released on August 21, 2025; investigations continue and the exploit chain can be initiated by parsing an image file in zero‑click or near-zero scenarios.

How the attack works

The flaw is an out‑of‑bounds write type in ImageIO. A specially crafted image can corrupt memory and be exploited to execute arbitrary code with the privileges of the process handling it. The exact vector has not been publicly described, but the most plausible surfaces include:

  • previews and automatic decoding of images in iMessage and in other messaging apps;
  • image rendering in Safari and in the WebKit engine;
  • file preview (Quick Look), Photo gallery, and notifications with multimedia content.

This makes the attack potentially zero‑interaction, a rare and, it must be said, dangerous combination on mobile platforms.

Why crypto wallets are particularly exposed

Attackers often focus on user behaviors. Screenshots of seed phrase, private keys, or QR codes stored in the camera roll can be extracted with OCR and recognition tools.

If the exploit allows access to local data or bypasses permissions, the transition from the device to the funds can be very rapid. In this context, elements that increase the risk are:

  • storage of recovery phrases in photos or notes with images;
  • app with extended access to the gallery;
  • clipboard that retains keys and seed longer than necessary.

Technical data in brief

  • CVE: CVE‑2025‑43300
  • Component: ImageIO (image decoding)
  • Type of bug: out‑of‑bounds write (memory corruption)
  • Impact: execution of arbitrary code potentially without interaction
  • Platforms involved: iOS, iPadOS, macOS
  • Correct versions: iOS/iPadOS 18.6.2; updates for macOS in distribution (Apple Support)
  • Exploitation status: exploited in targeted attacks (confirmed by Apple in the bulletin of August 21, 2025)
  • Criticality: high according to the analysis by Qualys (published on August 21, 2025)

How to understand if you have been hit

At the moment, there are no specific public Indicators of Compromise (IOC) for CVE‑2025‑43300. However, some prudent signals and checks include:

  • anomalous or repeated crashes of Messages, Safari, Photos, or preview processes;
  • requests for access to Photos from apps that normally should not need them;
  • unusual network activity from gallery or messaging apps when they are inactive;
  • presence of unknown configuration profiles in Settings > General > VPN and device management;
  • check the diagnostic logs in Settings > Privacy and security > Analysis and improvements > Analysis data, looking for crashes related to ImageIO.

In the absence of public IOCs, the priority remains the installation of updates and the reduction of exposure of sensitive data. It must be said that isolated clues are not enough to confirm a compromise.

Priority Measures (5 Essential Actions)

  • Install security updates: Apple indicates iOS/iPadOS 18.6.2 and updates for macOS as corrective releases for CVE‑2025‑43300. See the practical guide to update the device: How to update iOS/iPadOS.
  • Limit access to Photos: grant apps only “Selected Photos” access and revoke unnecessary permissions.
  • Remove seed and keys from images: delete screenshots of recovery phrases, keys, or QR codes from the camera roll; it is preferable to use offline supports or solutions documented in our guide on cold storage (Cold wallet: practical guide).
  • Use cold storage for significant amounts: keeping private keys off connected devices reduces the impact of potential compromises.
  • Manage the clipboard: avoid copying seed/keys, frequently clear the clipboard, and disable universal paste if not necessary.

Context and implications for Apple users

In recent months, several zero-day vulnerabilities have been fixed on iOS and macOS. Even when the fix arrives quickly, the distribution and installation times open a window of risk.

For those who safeguard digital assets, the most prudent approach combines timely updates with practices of data-minimization and key segregation. In this context, permission management remains central.

Quick FAQ

When is it convenient to install the update?

As soon as available for your device. Apple reports active exploits (bulletin of August 21, 2025), so the patch is among the current security priorities.

Is the update enough to protect the wallets?

Substantially reduces the risk related to CVE‑2025‑43300, but the protection of funds also requires the removal of seed/keys from the camera roll, more restrictive app permissions, and, for significant amounts, the use of cold wallet.

Which devices are affected?

All Apple devices that process images via ImageIO: iPhone and iPad (iOS/iPadOS) and Mac (macOS). Check in Settings > Software Update for the availability of the latest version.

Sources and insights

  • Apple – Security content of iOS 18.6.2 and iPadOS 18.6.2 (bulletin of August 21, 2025; note on exploitation in the wild)
  • Qualys ThreatPROTECT – Technical analysis of CVE‑2025‑43300 (published on August 21, 2025)
  • NVD (National Vulnerability Database) – CVE‑2025‑43300
  • MITRE – CVE‑2025‑43300

Editorial note: at the moment, the Apple bulletin does not publicly display an official CVSS score nor the specific macOS build numbers for all variants; detailed IOCs or the names of the researchers who reported the flaw have not been released. We will update this section as soon as new official publications are available (last content check: August 25, 2025).

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX presale hits $7.5M with tokens at $0.024 and 30% bonus code BLOCK30, while Solana holds $243 and Avalanche builds a $1B treasury to attract institutions.
Share
Blockchainreporter2025/09/18 01:07
Major Banks Rush to Get Crypto Charters in 2025

Major Banks Rush to Get Crypto Charters in 2025

The post Major Banks Rush to Get Crypto Charters in 2025 appeared on BitcoinEthereumNews.com. Key Highlights In the latest statement, the OCC revealed a major development that approves new federally chartered banks This might open the door for crypto and fintech companies to become regulated institutions An OCC official has raised his support for the authority of existing trust banks to hold digital assets for clients, stating that they have legally provided this custody service for decades and that crypto is not different  The U.S.’s leading banking regulator has revealed that many new federally chartered banks are going to be approved soon and stated that firms working with digital assets should have a clear regulatory framework to become regulated banks.  Our first public panel of the day: @USComptroller Jonathan Gould delivers a keynote and sits for a conversation to discuss the @USOCC’s modernization agenda and GENIUS Act implementation. Tune in to watch the livestream here: https://t.co/6gK6lZakdz — Blockchain Association (@BlockchainAssn) December 8, 2025 US Regulator Welcomes New Crypto-Friendly Banks Comptroller of the Currency’s head, Jonathan V. Gould, shared a statement at a Blockchain Association Summit on December 8, where he unveiled the regulator’s plan to integrate financial innovations into the existing financial infrastructure. In his official statement, he slammed the last 15 years of “completely stagnated” new bank formations by blaming regulators for discouraging applicants.  “Over the past 15 years, de novo chartering has completely stagnated. In the late 1990s, the OCC received over 100 de novo charter applications each year, and nearly 50 per year in the early 2000s. But from 2011 through 2024, the OCC received, on average, less than four charter applications per year,” he said. Jonathan V. Gould further added into his statement, “Following the financial crisis, there were years when the OCC received only one or two charter applications—as well as years when the OCC did not receive a…
Share
BitcoinEthereumNews2025/12/09 05:26