Less than a week after releasing iOS 18.6.1, Apple has launched update 18.6.2, which could supposedly stop hackers from accessing devices through “malicious image files.” The flaw, tracked as CVE-2025-43300, was identified inside Apple’s Image I/O framework, which handles the reading and writing of image files across its devices. According to the iPhone manufacturer, processing a maliciously crafted image could result in memory corruption and could allow an attacker to execute malicious code on the device. Apple said the bug had been exploited by an “extremely sophisticated attack against specific targeted individuals.” The company fixed the problem with iOS 18.6.2 and parallel security patches for macOS Sequoia, Sonoma and Ventura, issued in an unscheduled update late Wednesday. “For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available,” the company wrote on its official support page. Affected devices and update availability The iOS 18.6.2 update covers all iPhones released since 2018, beginning with the iPhone XS, XS Max, XR, and the second- and third-generation iPhone SE. The patch also extends to Apple’s latest devices, including the iPhone 16 series and iPhone 16e. Supported iPad models include the iPad Pro 13-inch, iPad Pro 12.9-inch (2nd generation and later), iPad Pro 11-inch (1st generation and later), iPad Pro 10.5-inch, iPad Air (3rd generation and later), iPad (6th generation and later), and iPad mini (5th generation and later). iOS new update notes. Source: Apple Support. The update is also available for Apple’s Mac computers running the three most recent versions of macOS. The tech giant is asking users not to wait for the automatic rollout and instead apply the patch manually, as the auto update could take time reaching all devices. How did update 18.6.1 make devices vulnerable? According to several security analysts, the flaw is an out-of-bounds write vulnerability, a type of bug that allows attackers to access or manipulate sections of device memory that should normally be restricted. Pieter Arntz, a former Microsoft consultant and researcher at cybersecurity firm Malwarebytes, explained in a blog post that the vulnerability could allow attackers to insert and run code in “inaccessible” parts of memory.  “Such a flaw in a program allows it to read or write outside the bounds the program sets, enabling attackers to manipulate other parts of the memory allocated to more critical functions,” he wrote. Arntz mentioned adversaries could exploit the bug by creating a malicious image file that corrupts memory as soon as the device processes it, even without user interaction. He compared the attack to so-called zero-click exploits, where spyware or malware is triggered simply by receiving or processing malicious content. “Processing such a malicious image file would result in memory corruption,” he said. “Memory corruption issues can be manipulated to crash a process or run an attacker’s code.” Apple has admitted it had received reports of the flaw being used in targeted attacks against certain individuals, but did not identify the victims. Sean Wright, head of application security at Featurespace, believes the exploit was too complex to be deployed on a wide scale. “Thankfully, the exploit does appear to be complex and likely only exploited in a very targeted attack, so most ordinary users are unlikely to become a victim,” Wright told Forbes. “But I would still highly recommend applying the fix as soon as possible to be on the safe side.” If you're reading this, you’re already ahead. Stay there with our newsletter.Less than a week after releasing iOS 18.6.1, Apple has launched update 18.6.2, which could supposedly stop hackers from accessing devices through “malicious image files.” The flaw, tracked as CVE-2025-43300, was identified inside Apple’s Image I/O framework, which handles the reading and writing of image files across its devices. According to the iPhone manufacturer, processing a maliciously crafted image could result in memory corruption and could allow an attacker to execute malicious code on the device. Apple said the bug had been exploited by an “extremely sophisticated attack against specific targeted individuals.” The company fixed the problem with iOS 18.6.2 and parallel security patches for macOS Sequoia, Sonoma and Ventura, issued in an unscheduled update late Wednesday. “For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available,” the company wrote on its official support page. Affected devices and update availability The iOS 18.6.2 update covers all iPhones released since 2018, beginning with the iPhone XS, XS Max, XR, and the second- and third-generation iPhone SE. The patch also extends to Apple’s latest devices, including the iPhone 16 series and iPhone 16e. Supported iPad models include the iPad Pro 13-inch, iPad Pro 12.9-inch (2nd generation and later), iPad Pro 11-inch (1st generation and later), iPad Pro 10.5-inch, iPad Air (3rd generation and later), iPad (6th generation and later), and iPad mini (5th generation and later). iOS new update notes. Source: Apple Support. The update is also available for Apple’s Mac computers running the three most recent versions of macOS. The tech giant is asking users not to wait for the automatic rollout and instead apply the patch manually, as the auto update could take time reaching all devices. How did update 18.6.1 make devices vulnerable? According to several security analysts, the flaw is an out-of-bounds write vulnerability, a type of bug that allows attackers to access or manipulate sections of device memory that should normally be restricted. Pieter Arntz, a former Microsoft consultant and researcher at cybersecurity firm Malwarebytes, explained in a blog post that the vulnerability could allow attackers to insert and run code in “inaccessible” parts of memory.  “Such a flaw in a program allows it to read or write outside the bounds the program sets, enabling attackers to manipulate other parts of the memory allocated to more critical functions,” he wrote. Arntz mentioned adversaries could exploit the bug by creating a malicious image file that corrupts memory as soon as the device processes it, even without user interaction. He compared the attack to so-called zero-click exploits, where spyware or malware is triggered simply by receiving or processing malicious content. “Processing such a malicious image file would result in memory corruption,” he said. “Memory corruption issues can be manipulated to crash a process or run an attacker’s code.” Apple has admitted it had received reports of the flaw being used in targeted attacks against certain individuals, but did not identify the victims. Sean Wright, head of application security at Featurespace, believes the exploit was too complex to be deployed on a wide scale. “Thankfully, the exploit does appear to be complex and likely only exploited in a very targeted attack, so most ordinary users are unlikely to become a victim,” Wright told Forbes. “But I would still highly recommend applying the fix as soon as possible to be on the safe side.” If you're reading this, you’re already ahead. Stay there with our newsletter.

Apple rushes out iOS update to patch dangerous image file exploit

Less than a week after releasing iOS 18.6.1, Apple has launched update 18.6.2, which could supposedly stop hackers from accessing devices through “malicious image files.”

The flaw, tracked as CVE-2025-43300, was identified inside Apple’s Image I/O framework, which handles the reading and writing of image files across its devices. According to the iPhone manufacturer, processing a maliciously crafted image could result in memory corruption and could allow an attacker to execute malicious code on the device.

Apple said the bug had been exploited by an “extremely sophisticated attack against specific targeted individuals.” The company fixed the problem with iOS 18.6.2 and parallel security patches for macOS Sequoia, Sonoma and Ventura, issued in an unscheduled update late Wednesday.

“For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available,” the company wrote on its official support page.

Affected devices and update availability

The iOS 18.6.2 update covers all iPhones released since 2018, beginning with the iPhone XS, XS Max, XR, and the second- and third-generation iPhone SE. The patch also extends to Apple’s latest devices, including the iPhone 16 series and iPhone 16e.

Supported iPad models include the iPad Pro 13-inch, iPad Pro 12.9-inch (2nd generation and later), iPad Pro 11-inch (1st generation and later), iPad Pro 10.5-inch, iPad Air (3rd generation and later), iPad (6th generation and later), and iPad mini (5th generation and later).

Apple issues urgent iOS update, iOS 18.6.2 update pinned critical for iPhone and iPads.iOS new update notes. Source: Apple Support.

The update is also available for Apple’s Mac computers running the three most recent versions of macOS. The tech giant is asking users not to wait for the automatic rollout and instead apply the patch manually, as the auto update could take time reaching all devices.

How did update 18.6.1 make devices vulnerable?

According to several security analysts, the flaw is an out-of-bounds write vulnerability, a type of bug that allows attackers to access or manipulate sections of device memory that should normally be restricted.

Pieter Arntz, a former Microsoft consultant and researcher at cybersecurity firm Malwarebytes, explained in a blog post that the vulnerability could allow attackers to insert and run code in “inaccessible” parts of memory. 

“Such a flaw in a program allows it to read or write outside the bounds the program sets, enabling attackers to manipulate other parts of the memory allocated to more critical functions,” he wrote.

Arntz mentioned adversaries could exploit the bug by creating a malicious image file that corrupts memory as soon as the device processes it, even without user interaction. He compared the attack to so-called zero-click exploits, where spyware or malware is triggered simply by receiving or processing malicious content.

“Processing such a malicious image file would result in memory corruption,” he said. “Memory corruption issues can be manipulated to crash a process or run an attacker’s code.”

Apple has admitted it had received reports of the flaw being used in targeted attacks against certain individuals, but did not identify the victims.

Sean Wright, head of application security at Featurespace, believes the exploit was too complex to be deployed on a wide scale.

“Thankfully, the exploit does appear to be complex and likely only exploited in a very targeted attack, so most ordinary users are unlikely to become a victim,” Wright told Forbes. “But I would still highly recommend applying the fix as soon as possible to be on the safe side.”

If you're reading this, you’re already ahead. Stay there with our newsletter.

Market Opportunity
LETSTOP Logo
LETSTOP Price(STOP)
$0.01464
$0.01464$0.01464
-4.50%
USD
LETSTOP (STOP) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Here is What Every Investor Should Do in a Crypto Bear Market

Here is What Every Investor Should Do in a Crypto Bear Market

The post Here is What Every Investor Should Do in a Crypto Bear Market appeared on BitcoinEthereumNews.com. When prices start to crater, crowds of traders run for the hills in fear, selling into a market bottom. But history has also shown that, painful as they are, downturns in crypto can be among the richest moments for those who know what they are doing. But unlike traditional markets, crypto never sleeps and trades off narratives, as well as moves right now on innovation, or news around the world. Which is why bear markets are so volatile — and also a time when they can be fertile ground for disciplined investors who are ready rather than panicked. In past cycles, the money managers who took this longer-term approach rather than chasing quick rebounds tended to make the biggest gains when the bull market returned. Against that kind of backdrop, the humpbacked migration-type of big-game whale behavior, like seen on MAGACOIN FINANCE, is a signal that pro money has already been quietly positioning for what’s upcoming, regardless of whether retail follows their tempo or not.  Focus on Fundamentals Bear markets separate the wheat from the chaff, revealing who is genuinely building utility and who was just hype. Investors would do well to monitor developer activity, real-world applications and active partnerships along with them. Strongly established, tech-backed cryptocurrencies with active communities have the best chances of weathering a storm and also making it against the upcoming bull cycle.  Accumulate Gradually Finding the exact bottom is nearly impossible. Instead of waiting for the “perfect” entry, strategies like dollar-cost averaging (DCA) allow steady accumulation over time. This approach lowers the emotional pressure of market timing and builds exposure at more favorable prices, preparing portfolios for recovery when optimism returns. Diversify Wisely Focusing on one token is exhilarating when the market is booming, but it can also be destructive during down cycles. Holding a…
Share
BitcoinEthereumNews2025/09/20 10:16
Eyes nine-day EMA barrier near 1.3450

Eyes nine-day EMA barrier near 1.3450

The post Eyes nine-day EMA barrier near 1.3450 appeared on BitcoinEthereumNews.com. GBP/USD remains steady for the second successive session, trading around 1.3430
Share
BitcoinEthereumNews2026/01/15 11:59
Why Bitcoin Is Rising Despite Hot US Inflation Data

Why Bitcoin Is Rising Despite Hot US Inflation Data

Bitcoin is showing renewed strength, climbing close to $97,000 and reaching its highest level in nearly two months. What makes the move notable is not just the
Share
Coinstats2026/01/15 11:53