Executive Summary
CVE-2025-43300 is a zero-day in Apple’s ImageIO framework that enables zero-click remote code execution across iOS, iPadOS, and macOS. Apple confirmed exploitation in “extremely sophisticated attacks” against targeted individuals. Forensic analysis confirms Italian journalists were compromised with Paragon’s Graphite spyware, while broader evidence indicates civil society, dissidents, and government officials are also at risk.
This marks the seventh zero-day patched by Apple in 2025 (as of August), underscoring a sustained escalation in targeting Apple platforms.
CVSS v3.1: 8.8 (High) | CVSS v2: 10.0 (Critical)
Vulnerability Overview
- Component: Apple ImageIO
- Type: Out-of-bounds write → memory corruption → RCE
- Affected Systems:
- iOS <18.6.2 (iPhone XS+)
- iPadOS <18.6.2 / <17.7.10 (iPad 7+, Air 3+, Mini 5+)
- macOS Sequoia <15.6.1, Sonoma <14.7.8, Ventura <13.7.8
- Root Cause: Improper bounds checking in image parsing
- Impact: Arbitrary code execution, sandbox escape, potential persistence
Zero-click vulnerabilities require no user interaction — which means no behavioral indicator to detect. Device hygiene, patch velocity, and threat intelligence are the only meaningful controls.
Noorstream delivers threat intelligence, vulnerability management, and offensive security assessments for high-risk environments.
Attack Vector
- Malicious images delivered via:
- iMessage and messaging apps
- Email attachments
- Embedded images on websites/social platforms
- Zero-click: Exploitation occurs automatically during image parsing, requiring no user interaction.
Exploitation Status
- Active exploitation confirmed by Apple and CISA (KEV deadline: Sept 11, 2025)
- Confirmed forensic cases:
- Ciro Pellegrino (Fanpage.it journalist)
- Francesco Cancellato (Fanpage.it editor)
- Both compromised with Graphite spyware (Citizen Lab, Amnesty reports)
- High confidence: Paragon Graphite spyware linked to exploitation
- Medium confidence: Nation-state coordination involved, with operational patterns resembling APT29/Cozy Bear tradecraft
- Assessed likely: Persistence mechanisms enabling long-term device compromise
Mitigation Steps
- Patch immediately: iOS 18.6.2, iPadOS 18.6.2/17.7.10, macOS Sequoia 15.6.1, Sonoma 14.7.8, Ventura 13.7.8
- Enable automatic updates to shrink exposure windows
- Deploy Lockdown Mode for high-risk individuals
- Apply mobile EDR/behavioral monitoring
- Enforce zero-trust controls in BYOD environments
High-Risk Indicators
Indicator Type: Device Behavior
Value: Unexplained crashes tied to ImageIO parsing
Confidence: High
Indicator Type: Network
Value: Outbound traffic to suspected C2 after image receipt
Confidence: Medium
Indicator Type: Target Profile
Value: Journalists, dissidents, government officials, civil society leaders
Confidence: High
Target Profiles
- Confirmed:
- Italian journalists (Fanpage.it – Pellegrino, Cancellato)
- High Confidence:
- European journalists covering corruption and national security
- U.S. government officials (validated by CISA’s KEV directive)
- Medium Confidence:
- Dissidents in exile (Russian/Belarusian media, activists)
- Human rights advocates and civil society leaders
- Elevated Risk:
- Corporate executives in defense, tech, and infrastructure sectors
- Academic researchers in surveillance/cybersecurity
Intelligence Assessment
CVE-2025-43300 demonstrates a strategic surveillance escalation against Apple platforms.
- High confidence: Graphite spyware deployed in European journalist targeting
- Medium confidence: Nation-state operations are coordinating or acquiring exploits, with tradecraft patterns consistent with APT29/Cozy Bear
- Assessed likely: Persistence mechanisms deployed for long-term access
This zero-click exploit reflects the continuing fusion of mercenary spyware vendors and state-backed intelligence operations, with journalists, dissidents, and officials as primary targets.

