WhatsApp Zero-Click Spyware Explained: CVE-2025–55177 Deep Dive
Introduction

Introduction
Back in early September 2025, WhatsApp sent out a big warning about a “zero-click” spyware attack. This is a particularly scary kind of attack because it can infect your phone without you having to do a thing, no clicking on a weird link, no downloading a sketchy file.
The attackers used a clever one-two punch:
CVE-2025–55177: A WhatsApp flaw, “incomplete authorization of linked device synchronization messages”, that allowed an unauthenticated attacker to force the victim’s device to process content from arbitrary URLs.
CVE-2025–43300: An Apple OS-level vulnerability affecting the ImageIO framework, enabling memory corruption via malicious images, patched in mid-August across iOS 18, iPadOS 17, and macOS Sequoia/Sonoma/Ventura
This wasn’t a widespread attack. It seems to have been highly targeted, affecting fewer than 200 people, most of whom were journalists, human rights activists, and other folks in civil society. This suggests the attackers were likely after information and possibly linked to state-sponsored groups. The whole thing went on for about three months, from late May to August 2025.

Scope and Severity
- WhatsApp patched the flaw in WhatsApp for iOS (≥ v2.25.21.73) and WhatsApp Business for iOS and WhatsApp for Mac (≥ v2.25.21.78) by late July and early August 2025
- Apple released corresponding OS updates, iOS 18.6.2, macOS 15.6.1, Sonoma 14.7.8, Ventura 13.7.8, around August 20, 2025
- CISA added CVE-2025–55177 to its Known Exploited Vulnerabilities (KEV) catalog on September 2, 2025, requiring U.S. federal agencies to apply patches by September 23, 2025 .
- Despite a moderate CVSS score of 5.4, the zero-click nature and chaining dramatically escalated its real-world impact
Technical Analysis
WhatsApp and Apple got on top of this pretty quickly.
- WhatsApp released a patch for the flaw in late July and early August 2025.
- Apple followed with its own OS updates around August 20, 2025, to fix the ImageIO vulnerability.
Even if you have the latest updates, security experts are urging users to take action.
Security Recommendations
- Update Your Apps: Make sure you’re on the latest version of WhatsApp. For iOS, that’s at least v2.25.21.73, and for Mac, it’s at least v2.25.21.78.
- Update Your Device: Install the latest operating system updates from Apple.
- Consider a Factory Reset: If you’re a high-risk individual (like a journalist or activist), some experts are even recommending a full factory reset of your device to make sure any hidden spyware is completely gone.
- Turn on Lockdown Mode: Apple has a great security feature called Lockdown Mode. If you’re concerned about being a target, turning this on adds an extra layer of protection.
Political & Economic Impact
The targeting of civil society actors, journalists, activists, human rights advocates, suggests a surveillance motive with authoritarian or state-sponsored fingerprints, even if attribution remains unclear. This echoes prior incidents, WhatsApp’s fights against NSO Group’s Pegasus spyware and past Paragon campaigns,amplifying concerns around digital rights and privacy.
For WhatsApp and Meta, the incident damages trust, particularly among high-risk users, potentially affecting adoption in sensitive sectors. Broader implications span: cybersecurity ecosystem costs (patching, threat intelligence, incident response), potential regulatory scrutiny, and legal exposures.
Why This Is Such a Big Deal
This isn’t just another bug. It highlights a worrying trend where powerful, sophisticated spyware can be delivered through everyday messaging apps. This isn’t just about personal security; it’s also a national security issue, as these kinds of exploits could be used to spy on governments and organizations.
For companies like Meta (which owns WhatsApp), incidents like this can hurt user trust, especially among the people who need strong privacy the most. It also reinforces the idea that we all need to be more vigilant about our digital security.
Ultimately, this incident is a stark reminder that even the most popular and trusted apps can be used as a vector for serious attacks.