Reverse Engineering a WhatsApp 0-Click Vulnerability: A Deep Dive into CVE-2025–43300
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。好的,首先我得仔细阅读一下用户提供的文章内容。 文章主要讲的是CVE-2025–43300这个漏洞,这是一个苹果ImageIO框架里的严重越界写入漏洞,影响iOS设备。攻击者通过制作一个恶意的DNG图像文件,里面有一些不匹配的元数据值,比如SamplesPerPixel=2但NumOfComponents=1。这样会导致内存损坏,进而引发远程代码执行。 然后,这个漏洞和WhatsApp的一个特定漏洞CVE-2025–55177结合起来,就变成了一个零点击攻击。也就是说,用户不需要做任何操作,比如点击链接或者查看图片,设备就会被攻破。这真的很可怕。 苹果在2024年底和2025年初紧急发布了iOS 18.6.2来修复这个漏洞。安全研究人员发现这个漏洞已经被实际利用了,攻击者正在用它来攻击真实的人。 好的,现在我要把这些信息浓缩到100字以内。首先说明漏洞是什么:CVE-2025–43300是苹果ImageIO框架中的越界写入漏洞。然后说明影响:影响iOS设备。接着描述攻击方式:通过恶意DNG图像文件触发内存损坏和远程代码执行。再提到与WhatsApp的漏洞结合成为零点击攻击。最后说明苹果的修复措施和漏洞的实际利用情况。 所以总结下来应该是:“ CVE-2025–43300是苹果ImageIO框架中的越界写入漏洞,影响iOS设备。通过恶意DNG图像文件触发内存损坏和远程代码执行。与WhatsApp特定漏洞结合形成零点击攻击。苹果紧急修复此漏洞,并发现其已被实际利用。” 这样刚好控制在100字以内,并且直接描述了内容。 </think> CVE-2025–43300是苹果ImageIO框架中的越界写入漏洞,影响iOS设备。通过恶意DNG图像文件触发内存损坏和远程代码执行。与WhatsApp特定漏洞结合形成零点击攻击。苹果紧急修复此漏洞,并发现其已被实际利用。 2026-4-3 06:1:23 Author: infosecwriteups.com(查看原文) 阅读量:6 收藏

Krishna Kumar

Based on “Reverse Engineering a WhatsApp 0-Click Vulnerability” by Billy Ellis

TL;DR: CVE-2025–43300 is a critical out-of-bounds write vulnerability in Apple’s ImageIO framework (specifically RawCamera library) that affects iOS devices. By crafting a malicious DNG image file with mismatched metadata values (SamplesPerPixel=2 but NumOfComponents=1), attackers can trigger memory corruption that leads to remote code execution. When paired with CVE-2025–55177 (a WhatsApp-specific bug), this becomes a true zero-click exploit requiring no user interaction whatsoever.

Press enter or click to view image in full size

🔍 Introduction: When Images Become Weapons

Imagine opening a photo on your iPhone and instantly — without tapping anything, clicking any link, or even viewing the full image — your device is compromised. That’s exactly what makes zero-click vulnerabilities so terrifying.

In late 2024 and early 2025, Apple rushed out iOS 18.6.2 to patch just such a vulnerability. This wasn’t some theoretical security flaw discovered in a lab. Security researchers found evidence that this bug was actively being exploited in the wild, meaning real attackers were using it against real people.


文章来源: https://infosecwriteups.com/reverse-engineering-a-whatsapp-0-click-vulnerability-a-deep-dive-into-cve-2025-43300-d8d425644fe9?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh