Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why this midrange Lenovo laptop is what I suggest to most people

    August 30, 2025

    Tamperedchef infostealer distributed through fraud PDF editor

    August 30, 2025

    Fachkräftemangel Bedroht Cybrasherhit | CSO online

    August 30, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Apple exploits new zero-day faults in target attacks
    Security

    Apple exploits new zero-day faults in target attacks

    PineapplesUpdateBy PineapplesUpdateAugust 20, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Apple exploits new zero-day faults in target attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Apple exploits new zero-day faults in target attacks

    Apple has issued an emergency updates to patch another zero-day vulnerability, which was exploited in the “highly sophisticated attack”.

    CVE-2025-43300 was tracked, this safety defect is caused by one Out-off-bounds write weakness Image I/O Framework was discovered by the Safety Researchers, which enables the application to read and write most image file formats.

    An out-of-bounds prescribe when the attackers successfully exploit such weaknesses by supplying input to a program, allowing this allocated memory to the data outside the buffer, allowing the program to corrupt the data, corruption, or, in the worst condition, allow remote code execution.

    “Apple knows about a report that the issue may have been exploited in a highly sophisticated attack against specific target persons,” the company revealed In security advice issued on Wednesday.

    “An out-of-bounds right issue was addressed with a better limit check. Processing a malicious image file can lead to memory corruption.”

    Apple has addressed the issue that with a better limit check to prevent exploitation iOS 18.6.2 and iPados 18.6.2, iPados 17.7.10, MacoS Sea 15.6.1, Mcos Sonoma 14.7.8And Mcos Ventura 13.7.8,

    The complete list of equipment affected by this zero-day vulnerability is widespread, as the bug affects both old and new models, including:

    • iPhone XS and later,
    • IPad Pro 13-inch, iPad Pro 12.9-inch’s third generation and later, iPad Pro 11-inch first generation and later, iPad Air 3 generations and later, iPad 7th generation and later, and later, and iPad Mini 5th generation and later, iPad Pro 10.9-inch, and 12-inch, iPad Pro 10.5-inch, and, iPad Pro 10.5-inch, and Got generation,
    • And MacoS Sea, Sonoma and Ventura running Mac.

    The company has yet credited one of its researchers and has not published details about the attacks described as “extremely sophisticated” yet.

    Although this defect is only exploited only in highly targeted attacks, it is strongly advised to install today’s security updates to prevent any possible ongoing attacks.

    With this vulnerability, Apple has exploited a total of six zero-days in Wilder since the beginning of the year, first in January (CVE-2025-24085), second in February (cve-2025-24200), a third (cve-2025-24201) in March (CVE-2025-24201), and two and April (cve-2025-31200 and two and two.

    In 2024, the company exploited six other zero-day actively: one in January, two in March, one fourth in May and two in November.


    Picus Blue Report 2025

    The passwords broke in 46% of the atmosphere, almost doubled by 25% last year.

    Picus Blue Report 2025 Now get a wider look at more conclusions on prevention, detection and data exfIs.

    Apple attacks exploits faults target zeroday
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAfrica Engineering Hardware: Education Change
    Next Article Google only tells ESIM in Pixel 10. Why it matters (and a warning)
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Tamperedchef infostealer distributed through fraud PDF editor

    August 30, 2025
    Security

    Fachkräftemangel Bedroht Cybrasherhit | CSO online

    August 30, 2025
    Security

    I invited Apple’s iPhone 17 event, and it took me under a rabbit hole of principles

    August 30, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Why this midrange Lenovo laptop is what I suggest to most people

    August 30, 2025

    Tamperedchef infostealer distributed through fraud PDF editor

    August 30, 2025

    Fachkräftemangel Bedroht Cybrasherhit | CSO online

    August 30, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.