Apple iMessage Zero-Click (Zero-Click) Vulnerability (CVE-2025-43200)

The Apple iMessage Zero-Click vulnerability allows an attacker to remotely compromise a device by sending a maliciously crafted iMessage message without user interaction. It has been exploited by Graphite spyware to launch attacks against journalists.

1. Vulnerability description:

CVE-2025-43200 is a zero-click vulnerability in Apple iMessage that has been exploited by Paragon, an Israeli commercial spyware, to spy on specific targeted users. The vulnerability allows an attacker to remotely compromise a device by sending a maliciously crafted iMessage message without user interaction. Apple has fixed the vulnerability in iOS version 18.3.1.

Apple iMessage Zero-Click (Zero-Click) Vulnerability (CVE-2025-43200)

2. Vulnerability impact:

Affected versions

iOS 18.2.1 and earlier versions
iPadOS 18.2.1 and earlier versions
macOS Sequoia prior to 15.3.1

3. Technical analysis

Vulnerability Technology Principles

Vulnerability exploits logical problems with iCloud Link sharing to launch attacks
It is a zero-click vulnerability that can be triggered without user interaction
Attacker sends message with malicious code via iMessage
Automatic installation of Graphite spyware when messages are received

attack vector

Dissemination channel: iMessage
Attacker account: "ATTACKER1″ iMessage account
Attacking server: IP address 46.183.184[...] 91 (belongs to VPS provider EDIS Global)
Attack fingerprint: matches the Citizen Lab labeled "Fingerprint P1″.

Chain of Attack:

Apple iMessage Zero-Click (Zero-Click) Vulnerability (CVE-2025-43200)

4. Attack cases:

Apple iMessage Zero-Click (Zero-Click) Vulnerability (CVE-2025-43200)

5. Impact assessment:

Apple iMessage Zero-Click (Zero-Click) Vulnerability (CVE-2025-43200)

6. Vulnerability verification:

Apple iMessage Zero-Click (Zero-Click) Vulnerability (CVE-2025-43200)

7. Repair strategy

Official Patch Application Guide

Preferred Restoration Options
Update to iOS 18.3.1 or later now!

Interim mitigation measures

For systems that cannot be updated immediately:

Implement network isolation to place critical systems in a controlled network environment
Configure firewall rules to restrict access to sensitive ports
Disable unnecessary system services and features
Layered Defense Strategy

Individual user defense

Update your operating system now
Enable Automatic Updates
Use of applications from trusted sources

Enterprise User Defense

Establish a vulnerability response process
Implementation of network segmentation and access control
Deploying Endpoint Detection and Response (EDR) Solutions
Building a defense system with reference to the "Trinity" attack chain model

refer to:

https://support.apple.com/en-asia/122174

Original article by Chief Security Officer, if reproduced, please credit https://cncso.com/en/apple-imessage-zero-click-vulnerability-cve-2025-43200-html

Like (0)
Previous June 12, 2025 at 11:41 pm
Next June 27, 2025 at 5:48 pm

Leave a Reply

Please Login to Comment