Apache Airflow Bug Exposes Data to Read-Only Users
September 28, 2025Apache Airflow Bug Exposes Data to Read-Only Users
September 28, 2025Severity
High
Analysis Summary
Researchers disclosed a dangerous zero-click remote code execution (RCE) vulnerability chain affecting WhatsApp on Apple’s iOS, macOS, and iPadOS. The attack leverages two distinct flaws — CVE-2025-55177 and CVE-2025-43300 — to compromise devices without any user interaction by delivering a specially crafted DNG image via WhatsApp.
The chain begins with CVE-2025-55177, a critical logic error in WhatsApp’s message handling. According to the researchers, WhatsApp fails to properly validate that an incoming message originates from a legitimately linked device. This oversight lets an attacker spoof a trusted source and deliver malicious content while bypassing initial security checks.
Once delivered, the exploit triggers CVE-2025-43300, a vulnerability in WhatsApp’s DNG image parsing library. The attacker crafts a malformed DNG file that causes memory corruption when processed, enabling remote code execution. Researchers published a proof-of-concept (PoC) that automates the attack: logging into WhatsApp, generating the malformed DNG payload, and sending it to a target phone number. Because it requires no user action, the attack is silent and highly effective.
A successful exploit could grant an attacker full control of the target device, allowing access to sensitive data, surveillance of communications, and deployment of additional malware — all without visible indicators to the victim. The disclosure underscores persistent risks associated with complex file formats and cross-platform messaging apps; file parsers remain a frequent source of RCE vulnerabilities.
Researchers noted that analysis continues, including investigation of a separate Samsung-related issue. Meanwhile, users are strongly advised to keep WhatsApp and their Apple operating systems updated and to apply security patches promptly when vendors release fixes to mitigate this high-risk threat. Organizations should also monitor network logs for suspicious WhatsApp traffic, restrict exposure where possible, and apply mobile device management controls in enterprise environments. Vendors (WhatsApp and Apple) are expected to issue patches addressing the flaws.
Impact
- Remote Code Execution
- Data Exfiltration
- Credential Theft
- Unauthorized Access
Indicators of Compromise
CVE
CVE-2025-55177
CVE-2025-43300
Remediation
- Update WhatsApp and OS immediately, install vendor patches as soon as they’re released to close the exploited vulnerabilities
- Block reception of media from unknown senders, restrict or disable automatic media download to prevent automatic parsing of malicious files
- Enable automatic app updates, ensure devices receive security fixes promptly without relying on manual installs
- Use mobile device management (MDM) policies, enforce app/OS versions, restrict installs, and apply security configurations centrally
- Restrict WhatsApp Web / linked devices, audit and unlink unknown or unused linked sessions to reduce spoofing risks
- Limit permissions for WhatsApp, remove unnecessary access to microphone, camera, files, and location to reduce impact of a compromise
- Network-level filtering of DNG and suspicious file types, block or sandbox uncommon image formats at gateways and proxies
- Deploy endpoint detection and response (EDR) on macOS/iOS where supported, monitor for anomalous processes, persistence, and data exfiltration
- Use strong device encryption and passcodes, protect stored data in case of partial compromise or device theft
- Enforce multi-factor authentication for linked services, reduce damage if credentials or tokens are stolen
- Monitor logs and alerts for unusual WhatsApp activity, detect unexpected message patterns, large media transfers, or device linking
- Educate users about zero-click risks and reporting, encourage reporting of unexplained behavior and avoidance of risky configurations
- Isolate high-risk devices and accounts, apply least-privilege access and network segmentation for critical users and systems
- Prepare an incident response plan specific to mobile compromise, include containment, forensic imaging, token rotation, and communication steps