On-Demand Webinar: Deep Session Inspection and rich metadata can change your security game.

CVE-2025-43300

CVE-2025-43300: ImageIO Out-of-Bounds Write: Targeted Zero-Day Exploited in the Wild

Vulnerability Overview 

CVE ID: CVE-2025-43300

CVE Title: Out-of-Bounds Write in Apple Image I/O (DNG / JPEG Lossless processing)

Severity: High

Exploit Status: Active exploitation observed; technical analyses and proof-of-concept artifacts have been publicly released.

Business Risk: Elevated — targeted device compromise, possible data access or device takeover for high-value individuals; enterprise exposure if employee devices are unpatched

Summary

CVE-2025-43300 is an out-of-bounds write (CWE-787) in Apple’s Image I/O / RawCamera image processing code. A crafted DNG/JPEG-lossless image can trigger a buffer overwrite when metadata (e.g., TIFF SamplesPerPixel) disagrees with the JPEG SOF3 component count. Unpatched systems processing such files may suffer memory corruption, crashes, and — in targeted real-world cases reported by Apple and researchers — potential arbitrary code execution. Apple has released fixes across iOS, iPadOS and macOS; CISA added this CVE to its Known Exploited Vulnerabilities list.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-43300?

Technical Overview

How Does the CVE-2025-43300 Exploit Work?

Here’s how the attack works:

CVE-2025-43300 Exploitation Process

What Causes CVE-2025-43300?

Vulnerability Root Cause:

The defect is a validation gap between DNG/TIFF metadata and the embedded JPEG Lossless stream in Apple’s image parsing code (RawCamera.bundle / Image I/O). The parser trusts the SamplesPerPixel metadata when allocating buffers, while the JPEG decoder later uses the SOF3 component count from the stream. When those values conflict, more pixel data is written than the buffer was sized for — an outofbounds write (CWE787) that leads to memory corruption.

How Can You Mitigate CVE-2025-43300?

If patching is delayed or not feasible:  

  • Do not open unsolicited or unknown image files (DNG/JPEG) on unpatched devices.
  • Disable automatic image previews in mail, messaging, and filesync clients where possible.
  • Block or restrict AirDrop and other adhoc file transfers for highrisk users.
  • Put highvalue accounts into Apple Lockdown Mode (if operationally acceptable).
  • Enforce stricter attachment handling: strip/scan image attachments before delivery to endpoints.
  • Use MDM to limit automatic media processing and to enforce temporary configuration restrictions.
  • Increase logging and monitor for imagerelated crashes or abnormal RawCamera/ImageIO activity.
  • Ingest and apply community detection rules and tools published by researchers to spot exploitation attempts.
  • Never run PoC or untrusted DNG files on production devices — analyze only in isolated labs/VMs.
  • Prioritize patch deployment for high-risk devices and track remediation progress.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-43300 Cause Downtime?

Patch application impact: Low. Updating to iOS / iPadOS 18.6.2, iPadOS 17.7.10, macOS Ventura 13.7.8, macOS Sonoma 14.7.8, or macOS Sequoia 15.6.1 resolves the vulnerability. Installation is straightforward, requires minimal user interaction, and causes only brief device restart downtime.

How Can You Detect CVE-2025-43300 Exploitation?

Exploitation Signatures:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

CVSS Breakdown Table

MetricValue Description
Base Score8.8High severity enabling memory corruption and potential code execution when processing crafted image/DNG files
Attack VectorNetworkTriggered remotely via delivered image files (iMessage, Mail, AirDrop, web, etc.)
Attack ComplexityLowExploitation does not require special conditions
Privileges RequiredNoneNo authentication or elevated privileges needed
User Interaction RequiredExploit requires the device to process/preview the malicious image (per CVSS vector in your references)
Scope UnChanged Impact remains within the vulnerable Image I/O component on the device
Confidentiality Impact HighExploitation can expose sensitive data on the device
Integrity ImpactHighMay allow unauthorized modification or code execution
Availability ImpactHighCan crash processes or lead to complete device compromise

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.