{"id":161114,"date":"2025-09-16T15:33:09","date_gmt":"2025-09-16T15:33:09","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/161114\/"},"modified":"2025-09-16T15:33:09","modified_gmt":"2025-09-16T15:33:09","slug":"apple-backports-zero-day-patches-to-older-iphones-and-ipads","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/161114\/","title":{"rendered":"Apple backports zero-day patches to older iPhones and iPads"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"Apple\" height=\"900\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/09\/apple_triangle.jpg\" width=\"1600\"\/><\/p>\n<p>\u200bApple has released security updates to backport patches released last month to older iPhones and iPads, addressing a zero-day bug that was exploited in &#8220;extremely sophisticated&#8221; attacks.<\/p>\n<p>This security flaw is the same one Apple <a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-emergency-updates-fix-new-actively-exploited-zero-day\/\" target=\"_blank\" rel=\"nofollow noopener\">has patched<\/a> for devices running iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, and macOS (Sequoia 15.6.1, Sonoma 14.7.8, and Ventura 13.7.8) on August 20.<\/p>\n<p>Tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-43300\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-43300<\/a>, this vulnerability was discovered by Apple security researchers and is caused by an <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/787.html\" target=\"_blank\" rel=\"nofollow noopener\">out-of-bounds write weakness <\/a>in the Image I\/O framework, which enables apps to read and write image file formats.<\/p>\n<p>An out-of-bounds write occurs when attackers supply maliciously crafted input to a program that causes it to write data outside the allocated memory buffer, potentially triggering crashes, corrupting data, or even allowing remote code execution.<\/p>\n<p>Apple has now addressed this zero-day flaw in iOS 15.8.5 \/ 16.7.12, as well as iPadOS 15.8.5 \/ 16.7.12, with improved bounds checks.<\/p>\n<p>&#8220;Processing a malicious image file may result in memory corruption. An out-of-bounds write issue was addressed with improved bounds checking,&#8221; the company said in <a href=\"http:\/\/support.apple.com\/en-us\/125142\" target=\"_blank\" rel=\"nofollow noopener\">Monday<\/a> <a href=\"https:\/\/support.apple.com\/en-us\/125141\" target=\"_blank\" rel=\"nofollow noopener\">advisories<\/a>.<\/p>\n<p>&#8220;Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.&#8221;<\/p>\n<p>The list of devices impacted by this vulnerability is quite extensive, with the bug affecting a wide range of older models, including:<\/p>\n<p>iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPhone 8, iPhone 8 Plus, and iPhone X,&#13;<br \/>\n\tiPad Air 2, iPad mini (4th generation), iPad 5th generation, iPad Pro 9.7-inch, iPad Pro 12.9-inch 1st generation, and iPod touch (7th generation)&#13;<\/p>\n<p>In late August, WhatsApp patched a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/whatsapp-patches-vulnerability-exploited-in-zero-day-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">zero-click vulnerability<\/a> (CVE-2025-55177) in its iOS and macOS messaging clients, which was chained with Apple&#8217;s CVE-2025-43300 zero-day in targeted attacks that the company described as &#8220;extremely sophisticated.&#8221;<\/p>\n<p>While Apple and WhatsApp have yet to release any details regarding the attacks chaining the two vulnerabilities, Donncha \u00d3 Cearbhaill, the head of Amnesty International&#8217;s Security Lab, <a href=\"https:\/\/x.com\/DonnchaC\/status\/1961444710620303653\" target=\"_blank\" rel=\"nofollow noopener\">said<\/a> that WhatsApp warned some of its users that their devices were targeted in an advanced spyware campaign.<\/p>\n<p>Last week, Samsung also <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/samsung-patches-actively-exploited-zero-day-reported-by-whatsapp\/\" target=\"_blank\" rel=\"nofollow noopener\">patched a remote code execution vulnerability<\/a> chained with the CVE-2025-55177 WhatsApp flaw in zero-day attacks targeting its Android devices.<\/p>\n<p>With this vulnerability, Apple fixed six zero-days that were exploited in the wild in 2025: the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-fixes-this-years-first-actively-exploited-zero-day-bug\/\" target=\"_blank\" rel=\"nofollow noopener\">first in January<\/a> (CVE-2025-24085), <a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-fixes-zero-day-exploited-in-extremely-sophisticated-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">the second in February<\/a> (CVE-2025-24200), a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-fixes-webkit-zero-day-exploited-in-extremely-sophisticated-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">third in March<\/a> (CVE-2025-24201), and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-fixes-two-zero-days-exploited-in-targeted-iphone-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">two more in April<\/a>(CVE-2025-31200 and CVE-2025-31201).<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored nofollow\"><br \/>\n            <img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/blue-report-2025.jpg\" alt=\"Picus Blue Report 2025\"\/><br \/>\n        <\/a><\/p>\n<p>46% of environments had passwords cracked, nearly doubling from 25% last year.<\/p>\n<p>Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Get the Blue Report 2025<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"\u200bApple has released security updates to backport patches released last month to older iPhones and iPads, addressing a&hellip;\n","protected":false},"author":2,"featured_media":161115,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41],"tags":[165,74],"class_list":{"0":"post-161114","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-mobile","9":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/161114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=161114"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/161114\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/161115"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=161114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=161114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=161114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}