Samsung Patches Zero-Day Flaw Exploiting Customers' Phones


You should know about a high-priority update that fixed a critical image parsing vulnerability flagged in the wild. The issue, tracked as CVE-2025-21043, was an out-of-bounds write in libimagecodec.quram.so and carried a CVSS score of 8.8.

Meta and WhatsApp teams reported active attacks on August 13, and the vendor’s September bulletin confirms the patch corrected an incorrect implementation in the image library. The bug affected Android builds 13 through 16 before the SMR Sep-2025 Release 1.

If you use a device that has not installed the September maintenance release, you face elevated risk. You can quickly check your build level and apply the update to reduce exposure.

Samsung patches zero-day security flaw used to hack into its customers’ phones

Key Takeaways

  • A critical image-parsing vulnerability (CVE-2025-21043) was fixed after real-world exploitation.
  • The issue affected Android 13–16 builds prior to SMR Sep-2025 Release 1.
  • Major companies reported the attacks, speeding the vendor's response.
  • If your device lacks the September update, check and install it now.
  • The exploit used image handling as an attack vector, so updates matter.

Quick brief: a high-severity vulnerability already exploited in the wild

A high-severity vulnerability was confirmed as actively exploited, making immediate updates essential. The issue carries a CVSS score of 8.8 and was reported by outside teams in mid-August.

Why this matters to you as an Android user in the U.S.

If you run Android 13, 14, 15, or 16 on a supported device and haven’t installed the SMR Sep-2025 Release 1 update, you face added risk. Real-world attack activity means attackers targeted devices before the fix was widely available.

You can reduce exposure by checking your update screen and installing the latest release. Doing this helps protect your apps and the personal data on your device.

At a glance: risk, affected devices, and the available advisory

Impact: remote code execution via crafted image parsing. Affected: android devices running versions 13–16 prior to the September release. Advisory: the September bulletin confirms a corrective update linked to reports from Meta and WhatsApp teams on August 13.

Action: treat the update as high priority. Install the patch, update key apps, and verify your build number to ensure the advisory has been applied to your device.

What Samsung fixed: out-of-bounds write in a parsing library enabling code execution

A faulty implementation in a system image parser opened a path for attackers to gain execution via media files. The root cause was an out-of-bounds write inside a closed-source parsing library used on many devices.

CVE-2025-21043 explained: out-of-bounds write and arbitrary code execution

This bug is an out-of-bounds write, which means the software wrote data outside its allowed memory area. That corruption can let an attacker achieve arbitrary code execution by crafting a malicious image.

The role of libimagecodec.quram.so in image parsing on devices

libimagecodec.quram.so is the image library that decodes certain formats for apps and system components. You rely on it whenever a photo or media preview loads, so a single library issue can impact many apps.

Affected Android versions: 13–16, prior to SMR Sep-2025 Release 1

The vulnerability affected Android 13, 14, 15, and 16 builds before the SMR Sep-2025 Release 1 update. The vendor’s fixes correct the incorrect implementation in the library, closing the memory corruption path.

Actionable takeaway: ensure your device runs SMR Sep-2025 Release 1 or later so the library fixes are applied and the bounds write cannot be exploited for code execution.

How it came to light: Meta and WhatsApp security teams flagged the exploit

Security teams from Meta and WhatsApp discovered an active exploit and reported it on August 13. That alert began the timeline that led to the vendor’s September advisory.

Reported on August 13 and acknowledged in the September update

The report named CVE-2025-21043 and credited the outside teams for disclosing the issue. The company rolled the correction into the September release and noted the incorrect implementation was fixed.

“Exploit existed in the wild”: what the advisory confirms—and omits

The advisory confirms the exploit existed in the wild but does not detail who was behind the attacks or the exact method. That omission is common while investigators protect ongoing probes and user safety.

The notice focuses on the technical issue and the fix rather than operational specifics. You should treat the advisory as a prompt: install the patches, watch for unusual behavior, and protect your data because attackers often follow public notices.

Samsung patches zero-day security flaw used to hack into its customers’ phones

Recent advisories link messaging app and OS fixes that show how dangerous zero-click attacks can be. WhatsApp fixed CVE-2025-55177 in August, and Apple patched a related ImageIO out-of-bounds write on August 20. Those notices warned that attackers targeted specific individuals and civil society.

Zero-click risk and targeted attacks: tying in WhatsApp and Apple advisories

WhatsApp’s advisory described a bug that could force processing of remote content. That forced processing made image content a powerful vector for remote code execution on devices.

Amnesty reported zero-click targeting of activists, and WhatsApp sent late-August threat notifications to affected users. You should treat these alerts as a linked threat model.

Possible chaining with CVE-2025-55177 (WhatsApp) and CVE-2025-43300 (Apple)

Attackers may chain an app bug that auto-loads content with an OS image parsing exploit to run spyware-grade code quietly. That combination can give persistent access and let attackers steal data on targeted devices.

Update your messaging app and phone so both app-level and system-level holes are closed against these kinds of attacks.

What you should do now: updates, checks, and reducing your risk

Take a few minutes to update and scan your device; that small step closes a major attack path. Quick actions now cut exposure and help protect your data.

Update your device: installing the SMR Sep-2025 Release 1 patch

Go to Settings > Software update > Download and install. Confirm your build shows SMR Sep-2025 Release 1 or later so the fixes are applied.

Enable automatic updates when possible. If the release is not yet available for your model, check your carrier or support page for timing.

Secure your apps and limit exploitation

Update WhatsApp from the Google Play Store so messaging-layer patches are active. Keep other apps current and remove any sideloaded apps you don’t trust.

Look for signs of compromise like strange battery drain, unknown apps, or odd network use. Consider a restart and run a full scan with a reputable app if you suspect malware.

Protect your data by backing up, using a strong screen lock, and enabling 2-step verification for accounts. Be cautious with media from unknown senders and limit app permissions that handle images.

If you need help, contact your IT team or carrier support. Staying current with updates and prompt installs is one of the best ways for android users to stay ahead of attackers and reduce risk.

What this means going forward for your device security

Keep in mind that mobile threats evolve quickly, and today's fix doesn't end the risk. The confirmed real-world exploitation and the SMR Sep-2025 Release 1 patch show how vital timely updates are for your devices and data.

Memory bugs like an out-of-bounds write in an image parsing library remain a common vulnerability that can lead to code execution. You should treat patches as routine maintenance and update apps such as messaging clients so whatsapp users and others get both app and OS protections.

Stay informed, enable automatic updates where possible, and limit automatic media processing. These layered steps reduce exposure to attacks, spyware, and other malware and help keep your device resilient as teams hunt for the next issue.

#buttons=(Ok, Go it!) #days=(20)

Our website uses cookies to enhance your experience. Check Out
Ok, Go it!