Apple Rushes Emergency Patch for Zero-Day Image Exploit

Zero-day flaw in Image I/O framework allowed remote code execution through malicious photos sent via Messages

Al Landes Avatar
Al Landes Avatar

By

Our editorial process is built on human expertise, ensuring that every article is reliable and trustworthy. AI helps us shape our content to be as accurate and engaging as possible.
Learn more about our commitment to integrity in our Code of Ethics.

Image credit: Wikimedia

Key Takeaways

Key Takeaways

  • Apple patches zero-day flaw allowing remote iPhone hijacking through malicious photos
  • CVE-2025-43300 exploits Image I/O framework enabling spyware installation without user interaction
  • Emergency updates available for iOS 18.6.2, iPadOS 18.6.2, and multiple macOS versions

Malicious images can now compromise your iPhone just by appearing on screen—no clicking required. Apple rushed emergency security patches Tuesday after discovering that attackers were exploiting a critical zero-day flaw through something as innocent as a photo in your Messages app. Your device processes hundreds of images daily through texts, emails, and web browsing, making this vulnerability particularly dangerous.

The Technical Nightmare Behind Pretty Pictures

A memory bug in Apple’s image processing lets sophisticated hackers execute code remotely.

The culprit is CVE-2025-43300, an out-of-bounds write flaw buried in Apple’s Image I/O framework—essentially the engine that handles every photo, screenshot, and meme your device displays. A malicious photo received via text could install spyware without any user interaction, bypassing all your device’s normal security protections.

Think of it like a bouncer who forgot to check IDs: malicious image files slip past security checks and gain access to your device’s most sensitive areas. Apple confirmed that attackers “may have been exploited in an extremely sophisticated attack against specific targeted individuals,” language typically reserved for state-sponsored spyware operations like those behind Pegasus.

Critical Security Update Required Now

Emergency patches are live across iOS, iPadOS, and macOS—here’s how to install them immediately.

Apple issued fixes for iOS 18.6.2, iPadOS 18.6.2 and 17.7.10, plus macOS updates across Sequoia (15.6.1), Sonoma (14.7.8), and Ventura (13.7.8). The update process remains mercifully simple:

  • Settings > General > Software Update on your iPhone or iPad
  • System Settings > General > Software Update for Mac users

If you’ve enabled automatic updates, your devices should download the fix without intervention—but don’t assume they have. Verify the update installed by checking your device’s About section for the new version number.

Part of a Disturbing Pattern

Media file vulnerabilities keep surfacing in Apple’s ecosystem, making rapid patching essential.

This incident continues a troubling trend of attackers weaponizing seemingly harmless media files against Apple devices. The sophistication required suggests resources typically associated with mercenary spyware vendors or nation-state actors. Computer problems like these emphasize that any exploit capable of remote code execution through basic image processing represents a severe threat that could eventually expand beyond targeted individuals.

When Apple issues emergency updates, the message is clear: update immediately, ask questions later. Your digital security depends on staying current with these critical security patches.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →