On September 15, 2025, Apple released iOS 16.7.12 and iPadOS 16.7.12, delivering essential security updates for older iPhone and iPad models. These updates address a critical zero-day vulnerability in the ImageIO framework, identified as CVE-2025-43300, which could allow attackers to execute arbitrary code by enticing users to process malicious image files.
Understanding CVE-2025-43300: The ImageIO Vulnerability
The vulnerability resides in the ImageIO component, responsible for handling image data across Apple’s operating systems. Specifically, it affects devices such as the iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch (1st generation). The flaw is an out-of-bounds write issue, occurring when ImageIO fails to properly validate image file boundaries, potentially leading to memory corruption.
Attackers can exploit this vulnerability by sending specially crafted image files via email, web links, or messaging apps. When a user processes such an image, the flaw can be triggered, granting the attacker code execution privileges at the kernel level. This level of access could allow the attacker to install malicious software, access sensitive data, or take control of the device.
Apple’s Response and Mitigation Measures
To mitigate this risk, Apple has implemented improved bounds checking within the ImageIO framework. This enhancement involves sanitizing image metadata and validating buffer lengths before processing, effectively preventing the out-of-bounds write issue that leads to memory corruption.
The sophistication of this exploit suggests its use in highly targeted attacks, where threat actors deliver malicious payloads through legitimate communication channels. Recognizing the severity of the threat, Apple has backported the patch to iOS 16.7.12 and iPadOS 16.7.12, ensuring that devices no longer eligible for full iOS 17 support remain protected.
Risk Assessment and Affected Devices
The following table summarizes the risk factors associated with CVE-2025-43300:
| Risk Factors | Details |
|————————|——————————————————————————————-|
| Affected Products | iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, iPad Pro 12.9-inch (1st gen) |
| Impact | Arbitrary code execution |
| Exploit Prerequisites | Processing a maliciously crafted image file (user interaction required) |
| CVSS 3.1 Score | 8.8 (High) |
Importance of Prompt Updates
For users of the affected devices, it is crucial to install the latest updates promptly to protect against potential exploits. To update your device:
1. Navigate to Settings > General > Software Update.
2. Follow the on-screen instructions to download and install iOS 16.7.12 or iPadOS 16.7.12.
For administrators managing multiple devices, deploying the update via mobile device management (MDM) solutions is recommended to ensure all devices are secured efficiently.
Apple’s Commitment to Security
Apple’s proactive approach in releasing these updates underscores its commitment to user security, even for older hardware. By addressing vulnerabilities in legacy devices, Apple ensures that users remain protected against evolving cyber threats.
Conclusion
The release of iOS 16.7.12 and iPadOS 16.7.12 is a critical step in safeguarding older iPhone and iPad models from a serious security flaw. Users are strongly encouraged to update their devices immediately to mitigate the risk of exploitation. Staying vigilant and keeping devices updated is essential in maintaining security in an increasingly digital world.