CVE-2025-43300
ENISA EUVD: EUVD-2025-25409 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
10 articles
Published: 2025-08-21
EPSS Score
Source: FIRST.org · 2026-05-23
4.42%
probability
This CVE has a 4.42% probability
of being exploited in the next 30 days.
0%
Top 89.1th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)10
CRITICAL
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
Affected Products
Apple
iOS and iPadOS
0
0
0
Apple
iPadOS
0
Apple
macOS
0
0
0
Attack Intelligence
Google Project Zero
Patched
Aug. 20, 2025
Reported by
Apple
Root Cause Analysis
???
Exploits & PoC
hunters-sec/CVE-2025-43300
This is POC for IOS 0click CVE-2025-43300
110
2025-08-24
7amzahard/CVE-2025-43300
CVE-2025-43300: iOS/macOS DNG Image Processing Memory Corruption
10
2025-12-02
PwnToday/CVE-2025-43300
CVE-2025-43300: iOS/macOS DNG Image Processing Memory Corruption
6
2025-09-09
3
2025-09-30
Dark-life944/CVE-2025
This is POC for IOS 0click CVE-2025-43300
1
2025-08-24
AR-DEV-1/CVE-2025-43300-exp
The exploit code for CVE-2025-43300.
0
2025-08-22
0
2025-09-18
7 repos — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
92%
EPSS
4.42%
CVSS v3.1
10
Mentions
10
Last Seen
Dec 13, 2025
CNA Information
CNA Assigner
apple
Analyst Note
This CVE is a confirmed zero-day with CVSS 10.0 criticality that has been actively exploited in sophisticated targeted attacks against specific individuals, as acknowledged by Apple. The vulnerability affects a wide range of iOS/iPadOS versions with official patches released, corroborated by multiple credible security news sources including BleepingComputer reporting on the exploited zero-day status.
Threat Actors 22
Lazarus Group
apt_group
Information theft and espionage
🇰🇵 KP
Cobalt
apt_group
Financial crime
🇷🇺 RU
APT 28
apt_group
Information theft and espionage
🇷🇺 RU
Hacking Team
apt_group
🇮🇹 IT
SCATTERED SPIDER
apt_group
Financial crime
🇺🇸 US
Watchdog
apt_group
🇨🇳 CN
Infy
apt_group
Information theft and espionage
🇮🇷 IR
[Unnamed group]
apt_group
🇨🇳 CN
RomCom
apt_group
Financial gain
🇷🇺 RU
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
Rocke
apt_group
🇨🇳 CN
Void Rabisu
apt_group
Financial gain
🇷🇺 RU
APT 6
apt_group
Information theft and espionage
🇨🇳 CN
Stealth Falcon
apt_group
Information theft and espionage
🇦🇪 AE
Silent Crow
apt_group
🇺🇦 UA
Pat Bear
apt_group
🇸🇾 SY
Operation Red Signature
apt_group
Information theft and espionage
🇨🇳 CN
Shadow Network
apt_group
Information theft and espionage
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
UNION SPIDER
apt_group
🇷🇺 RU
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Storm-2460
apt_group
🇷🇺 RU
Triage Info
Decided atMar 03, 2026
Published DateAug 21, 2025