iPhone Nightmare: How One Image Can Brick Your Device & Steal Your Data!
“Glass Cage” exploits iOS 18.2 with a silent PNG attack via iMessage. The zero-click exploit bypasses Apple’s defenses, leading to kernel-level access, iCloud Keychain theft, and optional device bricking. Despite detailed reports, Apple and MITRE ignored it, but CNVD gave credit. Who knew a PNG could be the most dangerous thing on your phone?

Hot Take:
Oh, Apple, you sneaky fruit! You’ve outdone yourself with this new zero-click iMessage exploit, “Glass Cage.” It’s like the Houdini of hacks—slipping through Apple’s defenses with a PNG image and leaving a trail of chaos, all while the user is blissfully unaware. Who knew a picture could say a thousand words… and then some, like “Bye-bye, iCloud Keychain” and “Oops, your phone is now a paperweight!”
Key Points:
– “Glass Cage” is a zero-click iMessage exploit compromising iOS 18.2 devices.
– The exploit uses a single malicious PNG image to bypass Apple’s defenses.
– It allows remote code execution, privilege escalation, and device bricking.
– Two CVEs were identified: CVE-2025-24085 and CVE-2025-24201.
– Despite reporting, the discoverer received no credit from Apple or MITRE.