Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

39C3 - DNGerousLINK: A Deep Dive into WhatsApp 0-Click Exploits on iOS and Samsung Devices

Автор: media.ccc.de

Загружено: 2026-01-05

Просмотров: 7698

Описание:

https://media.ccc.de/v/39c3-dngerousl...

The spyware attack targeting WhatsApp, disclosed in August as an in-the-wild exploit, garnered significant attention. By simply knowing a victim's phone number, an attacker could launch a remote, zero-interaction attack against the WhatsApp application on Apple devices, including iPhones, iPads, and Macs. Subsequent reports indicated that WhatsApp on Samsung devices was also targeted by similar exploits.
In this presentation, we will share our in-depth analysis of this attack, deconstructing the 0-click exploit chain built upon two core vulnerabilities: CVE-2025-55177 and CVE-2025-43300. We will demonstrate how attackers chained these vulnerabilities to remotely compromise WhatsApp and the underlying iOS system without any user interaction or awareness. Following our analysis, we successfully reproduced the exploit chain and constructed an effective PoC capable of simultaneously crashing the target application on iPhones, iPads, and Macs. Finally, we will present our analysis of related vulnerabilities affecting Samsung devices (such as CVE-2025-21043) and share how this investigation led us to discover additional, previously unknown 0-day vulnerabilities.

In August 2025, it attracted significant attention when Apple patched CVE-2025-43300, a vulnerability reportedly exploited in-the-wild to execute "extremely sophisticated attack against specific targeted individuals”. A week later, WhatsApp issued a security advisory, revealing the fix for a critical vulnerability, CVE-2025-55177, which was also exploited in-the-wild. Strong evidence indicated that these two vulnerabilities were chained together, enabling attackers to deliver a malicious exploit via WhatsApp to steal data from a user's Apple device, all without any user interaction.

To deconstruct this critical and stealthy in-the-wild 0-click exploit chain, we will detail our findings in several parts:
1. WhatsApp 0-Click Attack Vector (CVE-2025-55177). We will describe the 0-click attack surface we identified within WhatsApp. We will detail the flaws in WhatsApp's message handling logic for "linked devices," which stemmed from insufficient validation, and demonstrate how an attacker could craft malicious protocol messages to trigger the vulnerable code path.
2. iOS Image Parsing Vulnerability (CVE-2025-43300). The initial exploit allows an attacker to force the target's WhatsApp to load arbitrary web content. We will then explain how the attacker leverages this by embedding a malicious DNG image within a webpage to trigger a vulnerability in the iOS image parsing library. We will analyze how the RawCamera framework handles the parsing of DNG images, and pinpoint the resulting OOB vulnerability.
3. Rebuilding the Chain: From Vulnerability to PoC. In addition, we will then walk through our process of chaining these two vulnerabilities, constructing a functional Proof-of-Concept (PoC) that can simultaneously crash the WhatsApp application on target iPhones, iPads, and Macs.

Beyond Apple: The Samsung Connection (CVE-2025-21043). Samsung's September security bulletin patched CVE-2025-21043, an out-of-bounds write vulnerability in an image parsing library reported by the Meta and WhatsApp security teams. This vulnerability was also confirmed to be exploited in-the-wild. While an official WhatsApp exploit chain for Samsung devices has not been publicly detailed, we will disclose our findings on this related attack. Finally, we will share some unexpected findings from our investigation, including the discovery of several additional, previously undisclosed 0-day vulnerabilities.

Zhongrui Li, Yizhe Zhuang, Kira Chen

https://events.ccc.de/congress/2025/h...

#39c3 #Security

Licensed to the public under http://creativecommons.org/licenses/b...

39C3 - DNGerousLINK: A Deep Dive into WhatsApp 0-Click Exploits on iOS and Samsung Devices

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

39C3 - Watch Your Kids: Inside a Children's Smartwatch

39C3 - Watch Your Kids: Inside a Children's Smartwatch

39C3 - Agentic ProbLLMs: Exploiting AI Computer-Use and Coding Agents

39C3 - Agentic ProbLLMs: Exploiting AI Computer-Use and Coding Agents

UK Now Scans Every Message Before You Can Send It

UK Now Scans Every Message Before You Can Send It

Я в опасности

Я в опасности

The Next Generation of Web Exploits - Steve Sprecher(BSides CT 2025)

The Next Generation of Web Exploits - Steve Sprecher(BSides CT 2025)

What If You Keep Slowing Down?

What If You Keep Slowing Down?

39C3 - Bluetooth Headphone Jacking: A Key to Your Phone

39C3 - Bluetooth Headphone Jacking: A Key to Your Phone

39C3 - Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot

39C3 - Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot

Эфир - Самое ЛЕТУЧЕЕ Вещество на Земле!

Эфир - Самое ЛЕТУЧЕЕ Вещество на Земле!

39C3 - Don’t look up: There are sensitive internal links in the clear on GEO satellites

39C3 - Don’t look up: There are sensitive internal links in the clear on GEO satellites

The Craziest Experiment Humans Have Ever Built

The Craziest Experiment Humans Have Ever Built

DEFCON — это не то, чего я ожидал...

DEFCON — это не то, чего я ожидал...

Орешник это модернизированный Рубеж? И как украинцы узнали об ударе 9 января заранее?

Орешник это модернизированный Рубеж? И как украинцы узнали об ударе 9 января заранее?

39C3 - All my Deutschlandtickets gone: Fraud at an industrial scale

39C3 - All my Deutschlandtickets gone: Fraud at an industrial scale

39C3 - AI Agent, AI Spy

39C3 - AI Agent, AI Spy

Apple Wants You To Rent Apps Now

Apple Wants You To Rent Apps Now

React2Shell (CVE-2025-55182): объяснение и эксплуатация новой уязвимости React

React2Shell (CVE-2025-55182): объяснение и эксплуатация новой уязвимости React

We need to talk... about the Proton ecosystem

We need to talk... about the Proton ecosystem

ICE's New Surveillance System Knows Where You Go Every Day

ICE's New Surveillance System Knows Where You Go Every Day

39C3 - Hacking washing machines

39C3 - Hacking washing machines

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com