By using this site, you agree to our Privacy Policy and Terms of Service.
Accept
Absolute Geeks UAEAbsolute Geeks UAE
  • STORIES
    • TECH
    • AUTOMOTIVE
    • GUIDES
    • OPINIONS
  • REVIEWS
    • READERS’ CHOICE
    • ALL REVIEWS
    • ━
    • SMARTPHONES
    • CARS
    • HEADPHONES
    • ACCESSORIES
    • LAPTOPS
    • TABLETS
    • WEARABLES
    • SPEAKERS
    • APPS
  • WATCHLIST
    • TV & MOVIES REVIEWS
    • SPOTLIGHT
  • GAMING
    • GAMING NEWS
    • GAME REVIEWS
  • +
    • OUR STORY
    • GET IN TOUCH
Reading: WhatsApp patches zero-click exploit affecting iPhones and Macs
Share
Notification Show More
Absolute Geeks UAEAbsolute Geeks UAE
  • STORIES
    • TECH
    • AUTOMOTIVE
    • GUIDES
    • OPINIONS
  • REVIEWS
    • READERS’ CHOICE
    • ALL REVIEWS
    • ━
    • SMARTPHONES
    • CARS
    • HEADPHONES
    • ACCESSORIES
    • LAPTOPS
    • TABLETS
    • WEARABLES
    • SPEAKERS
    • APPS
  • WATCHLIST
    • TV & MOVIES REVIEWS
    • SPOTLIGHT
  • GAMING
    • GAMING NEWS
    • GAME REVIEWS
  • +
    • OUR STORY
    • GET IN TOUCH
Follow US

WhatsApp patches zero-click exploit affecting iPhones and Macs

GEEK DESK
GEEK DESK
Aug 30

WhatsApp has patched a major security flaw that exposed iPhone and Mac users to a zero-click attack capable of stealing data without any interaction. The vulnerability, tracked as CVE-2025-5517, stemmed from incomplete authorization checks in WhatsApp’s “linked device synchronization messages.” Attackers could pair it with another flaw, CVE-2025-43300, to trigger the processing of content from arbitrary URLs—making it possible to compromise a device simply by sending a malicious message.

What makes this case more concerning is that CVE-2025-43300 was not limited to WhatsApp. The exploit leveraged Apple’s Core Image library, a system-level component, meaning the flaw could also be abused through other apps before Apple patched it earlier this year. Amnesty International Security Lab’s Donncha Ó Cearbhaill highlighted the vulnerability on X (formerly Twitter), underscoring how deeply integrated image-processing functions can become an unexpected entry point for attackers.

Meta, which owns WhatsApp, has confirmed that the issue has been fixed in recent updates, but the company has also taken the unusual step of contacting potentially affected users directly. In some cases, Meta has advised users to factory reset their devices—even after applying the patch—to ensure that lingering exploits are fully removed.

The precise scope of the campaign remains unclear, but signs point to a sophisticated operation running for at least three months. Given the technical complexity and stealth of the attack, security analysts suspect the exploit was used to target individuals of high value rather than being deployed at scale.

Users running WhatsApp for iOS prior to version 2.25.21.73, WhatsApp Business for iOS before version 2.25.21.78, or WhatsApp for Mac prior to version 2.25.21.78 remain vulnerable if they have not updated. Installing the latest version is strongly recommended, alongside Apple’s recent security updates, to minimize exposure to this class of exploit.

This episode underscores how messaging platforms like WhatsApp—used daily for both personal and professional communication—remain prime targets for attackers. It also highlights the risks of software supply chains where vulnerabilities in system-level libraries, such as Apple’s Core Image, can cascade into popular apps.

Share
What do you think?
Happy0
Sad0
Love0
Surprise0
Cry0
Angry0
Dead0

WHAT'S HOT ❰

iPhone 17e arrives: specs, price, release date, and what’s new
Apple’s M4 iPad Air adds more memory, Wi-Fi 7, and a bigger push for iPad productivity
Lenovo Legion Tab Gen 5 launches at MWC 2026 with flagship specs
Qualcomm FastConnect 8800 introduces Wi-Fi 8 and Bluetooth 7 to mobile devices
Qualcomm Snapdragon Wear Elite target AI-powered wearables beyond smartwatches
Absolute Geeks UAEAbsolute Geeks UAE
Follow US
AbsoluteGeeks.com was assembled by Absolute Geeks Media FZE LLC during a caffeine incident.
© 2014–2026. All rights reserved.
Proudly made in Dubai, UAE ❤️
Upgrade Your Brain Firmware
Receive updates, patches, and jokes you’ll pretend you understood.
No spam, just RAM for your brain.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?