Loading cryptocurrency prices...

WhatsApp Fixes Zero-Day Bug Exploited in Targeted Spyware Attacks

  • WhatsApp fixed a significant security vulnerability that could affect iOS and macOS users.
  • The flaw, CVE-2025-55177, may have been used in real-world attacks combined with a separate Apple vulnerability.
  • The vulnerability allowed unauthorized users to trigger the processing of content from any URL on a target’s device.
  • Impacted versions include WhatsApp for iOS before 2.25.21.73, WhatsApp Business for iOS version 2.25.21.78, and WhatsApp for Mac version 2.25.21.78.
  • WhatsApp urged affected users to perform a full device reset and update their apps and operating systems.

WhatsApp has resolved a critical security issue impacting its messaging applications for Apple iOS and macOS. The company reported the vulnerability may have been actively exploited in combination with a recent Apple software flaw targeting specific users.

- Advertisement -

The vulnerability, tracked as CVE-2025-55177 with a severity score of 8.0 out of 10, involved insufficient authorization related to device synchronization messages. According to Meta, this security gap could permit an unrelated individual to make a target device process content from an arbitrary website address.

Meta listed affected software as WhatsApp for iOS versions before 2.25.21.73, WhatsApp Business for iOS version 2.25.21.78, and WhatsApp for Mac version 2.25.21.78. The company identified the issue internally and noted the vulnerability may have been combined with another Apple flaw, CVE-2025-43300, in targeted attacks. Apple recently disclosed CVE-2025-43300 as an out-of-bounds write flaw in the ImageIO framework, which could cause memory corruption when a malicious image is processed.

Amnesty International’s Security Lab head, Donncha Ó Cearbhaill, stated that WhatsApp notified a number of users believed to have been targets of an advanced spyware campaign in the past three months utilizing this vulnerability. In its alert to those affected, WhatsApp recommended a full device factory reset and keeping both WhatsApp and the device operating system updated for optimal protection.

Ó Cearbhaill described the two weaknesses as a “zero-click” attack, meaning the victim’s device could be compromised without any action, such as clicking a link. He explained, “Early indications are that the WhatsApp attack is impacting both iPhone and Android users, civil society individuals among them.” He added that government spyware remains a significant threat to journalists and human rights defenders.

- Advertisement -

It is currently unknown which group or company may be responsible for these attacks, and WhatsApp has not released any specific information about the perpetrators.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin Must Hold $114K Support to Confirm Recovery and Rally

Bitcoin's price needs to maintain support at $114,000 to confirm its recovery.Trading volume and...

Hedera Soars Following ETF Launch Approval: What Comes Next?

Hedera (HBAR) has surged significantly following confirmation of its ETF launch.HBAR rose 11.1% in...

Bitcoin Dips as Fed, Xi-Trump Meeting Loom; New Crypto ETFs Launch

Major cryptocurrencies, including Bitcoin, Ethereum, and BNB, declined...

Kalshi sues NY regulators over sports prediction markets legality

Kalshi filed a federal lawsuit against New York regulators to prevent them from classifying...

Venezuela Deepens Stablecoin Use Amid US Tensions and Inflation Crisis

Increasing U.S. military presence near Venezuela raises fears of conflict amid accusations of drug...
- Advertisement -

Must Read

Sushiswap vs Uniswap, What are the differences between these dex?

It's no secret that the world of decentralized exchanges has exploded in recent years. Many of you are probably wondering what the difference is...