WhatsApp Fixes Zero-Day Bug Exploited in Targeted Spyware Attacks

  • WhatsApp fixed a significant security vulnerability that could affect iOS and macOS users.
  • The flaw, CVE-2025-55177, may have been used in real-world attacks combined with a separate Apple vulnerability.
  • The vulnerability allowed unauthorized users to trigger the processing of content from any URL on a target’s device.
  • Impacted versions include WhatsApp for iOS before 2.25.21.73, WhatsApp Business for iOS version 2.25.21.78, and WhatsApp for Mac version 2.25.21.78.
  • WhatsApp urged affected users to perform a full device reset and update their apps and operating systems.

WhatsApp has resolved a critical security issue impacting its messaging applications for Apple iOS and macOS. The company reported the vulnerability may have been actively exploited in combination with a recent Apple software flaw targeting specific users.

- Advertisement -

The vulnerability, tracked as CVE-2025-55177 with a severity score of 8.0 out of 10, involved insufficient authorization related to device synchronization messages. According to Meta, this security gap could permit an unrelated individual to make a target device process content from an arbitrary website address.

Meta listed affected software as WhatsApp for iOS versions before 2.25.21.73, WhatsApp Business for iOS version 2.25.21.78, and WhatsApp for Mac version 2.25.21.78. The company identified the issue internally and noted the vulnerability may have been combined with another Apple flaw, CVE-2025-43300, in targeted attacks. Apple recently disclosed CVE-2025-43300 as an out-of-bounds write flaw in the ImageIO framework, which could cause memory corruption when a malicious image is processed.

Amnesty International’s Security Lab head, Donncha Ó Cearbhaill, stated that WhatsApp notified a number of users believed to have been targets of an advanced spyware campaign in the past three months utilizing this vulnerability. In its alert to those affected, WhatsApp recommended a full device factory reset and keeping both WhatsApp and the device operating system updated for optimal protection.

Ó Cearbhaill described the two weaknesses as a “zero-click” attack, meaning the victim’s device could be compromised without any action, such as clicking a link. He explained, “Early indications are that the WhatsApp attack is impacting both iPhone and Android users, civil society individuals among them.” He added that government spyware remains a significant threat to journalists and human rights defenders.

- Advertisement -

It is currently unknown which group or company may be responsible for these attacks, and WhatsApp has not released any specific information about the perpetrators.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Trump to Announce Pfizer Deal for Cheaper Medicaid Drug Prices

Pfizer is expected to announce a deal to lower its drug prices for Medicaid. The...

Republic to Tokenize Animoca Brands Equity on Solana Blockchain

Republic will tokenize equity in Animoca Brands on the Solana Blockchain. The move aims to...

Google Patches Gemini AI Vulnerabilities Exposing User Data

Three security flaws affecting Google's Gemini AI assistant were recently fixed after being disclosed...

BRICS May Announce New Common Currency at 2026 Delhi Summit

Speculation is increasing about BRICS launching a common currency in 2026.The next BRICS summit...

Visa Launches Stablecoin Pre-Funding Pilot for Business Payouts

VISA is launching a new pilot program that lets businesses use stablecoins for...
- Advertisement -

Must Read

8 Best Bitcoin Offshore Hosting Providers

In this blog post, we'll list the top 8 best bitcoin offshore hosting providers that accept Bitcoin and other cryptocurrencies.As Bitcoin continues to grow...