CVE-2025-43300

ENISA EUVD: EUVD-2025-25409 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 10 articles Published: 2025-08-21

EPSS Score

Source: FIRST.org · 2026-05-23
4.42%
probability
This CVE has a 4.42% probability of being exploited in the next 30 days.
0% Top 89.1th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
10
CRITICAL
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Description

VulnerabilityLookup (CNA)
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Affected Products

Apple
iOS and iPadOS
0 0 0
Apple
iPadOS
0
Apple
macOS
0 0 0

Attack Intelligence

Google Project Zero

Patched
Aug. 20, 2025
Reported by
Apple
Root Cause Analysis
???

Exploits & PoC

hunters-sec/CVE-2025-43300

This is POC for IOS 0click CVE-2025-43300

110 2025-08-24
7amzahard/CVE-2025-43300

CVE-2025-43300: iOS/macOS DNG Image Processing Memory Corruption

10 2025-12-02
PwnToday/CVE-2025-43300

CVE-2025-43300: iOS/macOS DNG Image Processing Memory Corruption

6 2025-09-09
Dark-life944/CVE-2025

This is POC for IOS 0click CVE-2025-43300

1 2025-08-24
AR-DEV-1/CVE-2025-43300-exp

The exploit code for CVE-2025-43300.

0 2025-08-22
7 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 4.42%
CVSS v3.1 10
Mentions 10
Last Seen Dec 13, 2025

CNA Information

CNA Assigner
apple

Analyst Note

This CVE is a confirmed zero-day with CVSS 10.0 criticality that has been actively exploited in sophisticated targeted attacks against specific individuals, as acknowledged by Apple. The vulnerability affects a wide range of iOS/iPadOS versions with official patches released, corroborated by multiple credible security news sources including BleepingComputer reporting on the exploited zero-day status.

Threat Actors 22

Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
Cobalt
apt_group Financial crime 🇷🇺 RU
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Hacking Team
apt_group 🇮🇹 IT
SCATTERED SPIDER
apt_group Financial crime 🇺🇸 US
Watchdog
apt_group 🇨🇳 CN
Infy
apt_group Information theft and espionage 🇮🇷 IR
[Unnamed group]
apt_group 🇨🇳 CN
RomCom
apt_group Financial gain 🇷🇺 RU
APT 22
apt_group Information theft and espionage 🇨🇳 CN
Rocke
apt_group 🇨🇳 CN
Void Rabisu
apt_group Financial gain 🇷🇺 RU
APT 6
apt_group Information theft and espionage 🇨🇳 CN
Stealth Falcon
apt_group Information theft and espionage 🇦🇪 AE
Silent Crow
apt_group 🇺🇦 UA
Pat Bear
apt_group 🇸🇾 SY
Operation Red Signature
apt_group Information theft and espionage 🇨🇳 CN
Shadow Network
apt_group Information theft and espionage 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
UNION SPIDER
apt_group 🇷🇺 RU
APT 5
apt_group Information theft and espionage 🇨🇳 CN
Storm-2460
apt_group 🇷🇺 RU

Triage Info

Decided atMar 03, 2026
Published DateAug 21, 2025