{"id":628,"date":"2025-09-15T13:25:02","date_gmt":"2025-09-15T11:25:02","guid":{"rendered":"https:\/\/blog.digitalonion.ly\/?p=628"},"modified":"2025-09-15T13:25:04","modified_gmt":"2025-09-15T11:25:04","slug":"samsung-patches-actively-exploited-zero-day-reported-by-whatsapp","status":"publish","type":"post","link":"https:\/\/blog.digitalonion.ly\/?p=628&lang=en","title":{"rendered":"Samsung patches actively exploited zero-day reported by WhatsApp"},"content":{"rendered":"\n<p>Samsung has patched a remote code execution vulnerability that was exploited in zero-day attacks targeting its Android devices. Tracked as CVE-2025-21043, this critical security flaw affects Samsung devices running Android 13 or later and was reported by the security teams of Meta and WhatsApp on August 13. As Samsung explains in a&nbsp;recently updated advisory, this vulnerability was discovered in libimagecodec.quram.so (a closed-source image parsing library developed by Quramsoft that implements support for various image formats) and is caused by an&nbsp;out-of-bounds write&nbsp;weakness that allows attackers to execute malicious code on vulnerable devices remotely. Out-of-bounds Write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 allows remote attackers to execute arbitrary code, Samsung says. Samsung was notified that an exploit for this issue has existed in the wild. While&nbsp;Samsung&nbsp;didn&#8217;t specify whether the attacks targeted only WhatsApp users with Samsung Android devices, other instant messengers that utilize the vulnerable image parsing library could also be potentially targeted using CVE-2025-21043 exploits. As part of our proactive investigation into a highly targeted exploit over the summer (which resulted in our security advisory for iOS\/MacOS WhatsApp users), we shared our findings with our industry peers, including Apple and Samsung, a Meta spokesperson told BleepingComputer. Apple mitigated the relevant high-severity vulnerability (CVE-2025-43300) last month.&nbsp;Samsung also issued a patch for SVE-2025-1702 and published their security advisory this week.<\/p>\n\n\n\n<p>Contact us : <a href=\"tel:00218915579536\u202c\">0915579536\u202c<\/a><\/p>\n\n\n\n<p>Or on the website <a href=\"http:\/\/digitalonion.ly\" target=\"_blank\" rel=\"noreferrer noopener\">digitalonion.ly<\/a><\/p>\n\n\n\n<p><strong>Visit us at our company address: Tripoli \u2013 Andalus Street \u2013 Next to the Iraqi Embassy.<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/maps.app.goo.gl\/xtDNpMSSfVe7zC9t9?fbclid=IwZXh0bgNhZW0CMTAAAR0agjJLdY1fw8Svc0z1ODqZbUdA7iBvh0QACYyoRcdYQ4NGTYHbZ6bQGtg_aem_klwdVZms8wjhcVBzxmkYtw\">Company address on the map<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Samsung has patched a remote code execution vulnerability that was exploited in zero-day attacks targeting [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":629,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[81,7],"tags":[],"class_list":["post-628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-uncategorized-en"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.digitalonion.ly\/wp-content\/uploads\/2025\/09\/Untitled-4.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts\/628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=628"}],"version-history":[{"count":2,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts\/628\/revisions"}],"predecessor-version":[{"id":631,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts\/628\/revisions\/631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/media\/629"}],"wp:attachment":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}