Apple iOS CVE-2025-43300: Patch Analysis Reveals ImageIO Zero-Click Exploit

Reza Rafati Avatar
5–8 minutes

Security researchers have published a detailed patch analysis of CVE-2025-43300, a vulnerability affecting Apple’s iOS ecosystem that was previously exploited in targeted attacks. The flaw resides in Apple’s ImageIO framework, a widely used component responsible for parsing and rendering image files across iOS, iPadOS, and macOS.

The technical analysis was published by Madimodi Diawara of Quarkslab on September 4, 2025. By reverse engineering Apple’s security update released on August 20, 2025, the researcher reconstructed how the vulnerability worked internally and how specially crafted image files could trigger memory corruption.

According to the research, the vulnerability could allow specially crafted image files to trigger an out-of-bounds write condition during image decoding. Because image parsing often occurs automatically when media is previewed or rendered, this class of bug can create a powerful exploitation pathway for attackers.

Apple previously warned that the vulnerability may have been exploited in “extremely sophisticated attacks against specific targeted individuals.” Such language typically indicates the bug was used in high-end surveillance campaigns rather than widespread cybercrime activity.

Technical Analysis of CVE-2025-43300

CVE-2025-43300 is an out-of-bounds write vulnerability located within Apple’s ImageIO framework. ImageIO is responsible for parsing multiple image formats used across Apple operating systems, including iOS, iPadOS, and macOS. Because this framework is used by many applications and system components, vulnerabilities in this code path can expose a large attack surface.

According to the patch analysis published by Quarkslab, the vulnerability originates from insufficient validation of parameters derived from image metadata during the decoding process. When processing specially crafted image files, the vulnerable code failed to properly verify bounds before performing memory write operations.

This lack of validation allowed attackers to manipulate internal values used by the image decoding routine. By carefully crafting an image file structure, an attacker could cause the decoder to write data outside the intended memory region, leading to memory corruption.

Apple addressed the flaw by introducing stricter bounds checking in the affected routines. The patch ensures that metadata values and buffer sizes are validated before memory operations occur, preventing the out-of-bounds write condition that enabled exploitation.

Exploitation Context and Targeted Attacks

Apple confirmed that CVE-2025-43300 may have been exploited in what it described as “extremely sophisticated attacks” targeting specific individuals. This language is typically used by the company when vulnerabilities are leveraged in advanced surveillance campaigns rather than widespread cybercrime activity.

Vulnerabilities in image parsing components are particularly valuable to advanced threat actors because images are frequently processed automatically by operating systems and applications. Messaging apps, email clients, and browsers often decode images to generate previews or thumbnails without requiring explicit user interaction.

In scenarios where a malicious image is delivered through a messaging platform or web page, the vulnerable component may process the file automatically. If exploitation succeeds during this decoding stage, attackers may achieve code execution without the victim opening the file manually, creating the conditions for so-called zero-click attacks.

This attack model has been observed in several high-profile spyware campaigns targeting journalists, political figures, and activists. While Apple has not publicly attributed the exploitation of CVE-2025-43300 to a specific threat actor, the limited targeting and technical complexity suggest the vulnerability may have been used in a highly controlled surveillance operation.

Similar vulnerability research has recently highlighted weaknesses in Apple’s broader ecosystem. For example, Google researchers previously uncovered multiple flaws in the WebKit browser engine used across iOS and macOS devices, demonstrating how complex rendering frameworks can become high-value targets for attackers (Google’s AI System Identifies Critical WebKit Vulnerabilities).

Zero-click attacks are also becoming increasingly common in mobile espionage campaigns. In a separate case covered by Cyberwarzone, a critical mobile vulnerability enabled the deployment of advanced spyware without requiring user interaction (Samsung Zero-Click Vulnerability Exploited Deploying LANDFALL Spyware). These incidents illustrate how modern surveillance campaigns increasingly rely on stealthy exploitation chains involving media parsing bugs and messaging platforms.

Similar vulnerability research has recently highlighted weaknesses in Apple’s broader ecosystem. For example, Google researchers previously uncovered multiple flaws in the WebKit browser engine used across iOS and macOS devices, demonstrating how complex rendering frameworks can become high-value targets for attackers (Google’s AI System Identifies Critical WebKit Vulnerabilities).

Zero-click attacks are also becoming increasingly common in mobile espionage campaigns. In a separate case covered by Cyberwarzone, a critical mobile vulnerability enabled the deployment of advanced spyware without requiring user interaction (Samsung Zero-Click Vulnerability Exploited Deploying LANDFALL Spyware). These incidents illustrate how modern surveillance campaigns increasingly rely on stealthy exploitation chains involving media parsing bugs and messaging platforms.

Root Cause of CVE-2025-43300: DNG Metadata Mismatch in ImageIO

Further reverse engineering of the patch revealed that the vulnerability originates from Apple’s handling of Digital Negative (DNG) image files processed by the RawCamera component within the ImageIO framework. DNG files can embed JPEG lossless image streams along with extensive TIFF metadata that describes how pixel data should be interpreted.

Researchers found that the vulnerability occurs when metadata describing the number of samples per pixel conflicts with the number of components declared inside the embedded JPEG stream. When these values mismatch, the decoder allocates buffers using one value but later writes pixel data based on the other.

This inconsistency causes the decoding loop to write more pixel data than the allocated buffer can hold, creating an out-of-bounds write condition. In practice, this means carefully crafted DNG images can trigger memory corruption during decompression.

Because image processing happens automatically in many contexts, the bug can potentially be triggered when devices generate thumbnails or preview media files received through messaging applications, email attachments, or web content.

Conclusion

The patch analysis of CVE-2025-43300 highlights how subtle inconsistencies in complex media parsing pipelines can introduce critical security vulnerabilities. In this case, a mismatch between metadata values and actual image component structures allowed attackers to trigger an out-of-bounds write during image decoding inside Apple’s ImageIO framework.

Because image files are routinely processed automatically across messaging platforms, email clients, and web browsers, vulnerabilities in image processing libraries remain highly valuable for advanced threat actors. Exploits delivered through malicious images can potentially execute code without requiring explicit user interaction.

Apple has already patched the issue across supported versions of iOS, iPadOS, and macOS by implementing stronger bounds checking in the affected routines. Organizations and users should ensure devices are running the latest security updates to mitigate the risk posed by this vulnerability.

The research also demonstrates the value of patch diff analysis for the security community. By studying how vulnerabilities are fixed, researchers can better understand the underlying root cause and identify similar bug patterns that may exist elsewhere in complex media processing frameworks.

CVE-2025-43300 Disclosure Timeline

  • August 20, 2025: Apple releases security updates addressing CVE-2025-43300 across multiple operating systems including iOS, iPadOS, and macOS.
  • September 4, 2025: Quarkslab researcher Madimodi Diawara publishes a technical patch analysis explaining the root cause of the vulnerability.
  • Subsequent reporting: Security researchers link the vulnerability to a targeted exploit chain used against fewer than 200 individuals.

The timeline highlights how patch diff analysis can reveal the underlying mechanics of vulnerabilities after vendors release fixes, allowing the security community to better understand exploitation techniques.

Affected Apple Platforms and Security Updates

Apple addressed CVE-2025-43300 through a series of security updates released in August 2025. The patches introduced improved bounds checking within the ImageIO framework to prevent malicious image files from triggering memory corruption.

  • iOS 18.6.2
  • iPadOS 18.6.2
  • iPadOS 17.7.10
  • macOS Sequoia 15.6.1
  • macOS Sonoma 14.7.8
  • macOS Ventura 13.7.8

Apple later backported the fix to additional versions to ensure older devices received protection. Users and organizations are strongly advised to install the latest security updates to mitigate the risk posed by the vulnerability.

Tags