{"id":6114,"date":"2025-08-29T21:00:34","date_gmt":"2025-08-29T21:00:34","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=6114"},"modified":"2025-08-29T21:00:34","modified_gmt":"2025-08-29T21:00:34","slug":"whatsapp-zero-day-vulnerability-exploited-with-0-click-on-assaults-to-hack-apple-gadgets","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=6114","title":{"rendered":"WhatsApp Zero-Day Vulnerability Exploited with 0-Click on Assaults to Hack Apple Gadgets"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>WhatsApp has issued a essential safety advisory addressing a newly found zero-day vulnerability, tracked as CVE-2025-55177, which has been exploited in extremely subtle zero-click assaults focusing on Mac and iOS customers.<\/p>\n<p>The vulnerability, mixed with an OS-level flaw (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/poc-exploit-published-for-apple-0-day-rce-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-43300<\/a>), has raised alarms concerning the potential compromise of consumer gadgets and information, together with delicate messages.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-vulnerability-details\"><strong>Vulnerability Particulars<\/strong><\/h2>\n<p>The Vulnerability <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/billmarczak\/status\/1961459546024800260\" target=\"_blank\" rel=\"noreferrer noopener\">uncovered<\/a> by WhatsApp\u2019s investigation, detailed in a Friday <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.whatsapp.com\/security\/advisories\/2025\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">safety advisory<\/a>, revealed that the flaw stems from an \u201cincomplete authorization of linked gadget synchronization messages\u201d in WhatsApp for iOS (previous to model 2.25.21.73), WhatsApp Enterprise for iOS (previous to v2.25.21.78), and WhatsApp for Mac (previous to v2.25.21.78). <\/p>\n<p>This vulnerability allowed an unrelated consumer to set off the processing of content material from an arbitrary URL on a goal\u2019s gadget, bypassing the necessity for any consumer interplay\u2014therefore the \u201czero-click\u201d designation.<\/p>\n<p>The severity escalated when it was found that this WhatsApp flaw was exploited at the side of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/apple-confirms-critical-0-day-under-active-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-43300<\/a>, an out-of-bounds write vulnerability in Apple\u2019s ImageIO framework. <\/p>\n<p>Apple had beforehand patched this OS-level situation, confirming its exploitation in \u201cextraordinarily subtle assaults towards particular focused people.\u201d <\/p>\n<p>The mix of those vulnerabilities created a potent assault vector, probably resulting in reminiscence corruption and unauthorized entry to gadget information.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-ongoing-investigation\"><strong>Ongoing Investigation<\/strong><\/h2>\n<p>The incident has prompted an lively investigation by Amnesty Worldwide\u2019s Safety Lab, which is inspecting instances involving a number of people focused on this marketing campaign. <\/p>\n<p>Early indications recommend that the<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/whatsapp-vulnerability-2\/\" target=\"_blank\" rel=\"noreferrer noopener\"> WhatsApp assault<\/a> is impacting each iPhone and Android customers, with civil society people, together with journalists and human rights defenders, amongst these affected. <\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\ud83d\udea8 BREAKING: New zero-click exploit used to hack   WhatsApp customers.<\/p>\n<p>WhatsApp has simply despatched out a spherical of risk notifications to people they imagine the place focused by a sophisticated adware marketing campaign in previous 90 days. <\/p>\n<p>Hunt down skilled assist in case you have acquired this alert <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/t.co\/i4cHLsiNOr\">pic.twitter.com\/i4cHLsiNOr<\/a><\/p>\n<p>\u2014 Donncha \u00d3 Cearbhaill (@DonnchaC) <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/DonnchaC\/status\/1961444710620303653?ref_src=twsrc%5Etfw\">August 29, 2025<\/a><\/p><\/blockquote>\n<\/div>\n<\/figure>\n<p>The persistent risk of presidency adware continues to hazard these teams, underscoring the necessity for strong protecting measures.<\/p>\n<p>Notably, the Apple vulnerability (CVE-2025-43300) resides in a core picture library, that means it may probably be exploited by way of different purposes moreover WhatsApp. <\/p>\n<p>\u201cCVE-2025-55177, an authorization bypass in WhatsApp on iOS and Mac, allowed attackers to drive \u201ccontent material from an arbitrary URL\u201d to be rendered on a goal\u2019s gadget.\u201d<\/p>\n<p>WhatsApp and safety specialists advise the next steps to mitigate dangers:<\/p>\n<ul class=\"wp-block-list\">\n<li>Replace WhatsApp to the newest model (iOS v2.25.21.73 or later, Enterprise iOS v2.25.21.78 or later, Mac v2.25.21.78 or later).<\/li>\n<li>Set up the newest working system updates for iOS, iPadOS, and macOS.<\/li>\n<li>Allow enhanced safety features corresponding to Lockdown Mode on iOS or Superior Safety on Android.<\/li>\n<\/ul>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Discover this Information Fascinating! Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Instantaneous Updates!<\/strong><\/p>\n<\/div>\n<p><template id="afHQB7Kgl9X1oNTLbJcl"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WhatsApp has issued a essential safety advisory addressing a newly found zero-day vulnerability, tracked as CVE-2025-55177, which has been exploited in extremely subtle zero-click assaults focusing on Mac and iOS customers. The vulnerability, mixed with an OS-level flaw (CVE-2025-43300), has raised alarms concerning the potential compromise of consumer gadgets and information, together with delicate messages. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6116,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[5007,1395,145,355,1994,940,1061,3262,4218],"class_list":["post-6114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-0click","tag-apple","tag-attacks","tag-devices","tag-exploited","tag-hack","tag-vulnerability","tag-whatsapp","tag-zeroday"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6114"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6114\/revisions"}],"predecessor-version":[{"id":6115,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6114\/revisions\/6115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/6116"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-15 14:23:58 UTC -->