Tech »  Topic »  WhatsApp 0-Click Flaw Abused via Malicious DNG Image File

WhatsApp 0-Click Flaw Abused via Malicious DNG Image File


A newly discovered zero-click remote code execution (RCE) vulnerability in WhatsApp is putting millions of Apple users at risk.

Researchers from DarkNavyOrg have demonstrated a proof-of-concept (PoC) exploit that leverages two distinct flaws to compromise iOS, macOS, and iPadOS devices without any user interaction.

The attack chain begins with CVE-2025-55177, a critical logic error in WhatsApp’s message handling.

0-click Attack

According to DarkNavyOrg, WhatsApp fails to validate whether an incoming message truly originates from a linked device.

We triggered WhatsApp 0-click on iOS/macOS/iPadOS.
CVE-2025-55177 arises from missing validation that the [Redacted] message originates from a linked device, enabling specially crafted DNG parsing that triggers CVE-2025-43300.
Analysis of Samsung CVE-2025-21043 is also ongoing. pic.twitter.com/idwZXqh5WK

— DARKNAVY (@DarkNavyOrg) September 28, 2025

This missing check allows an attacker to craft messages that appear to come from a user’s own trusted account. As soon as WhatsApp processes the ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE