Apple has issued an urgent security advisory concerning three critical zero-day vulnerabilities – CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085 – which are being actively exploited in the wild.
These vulnerabilities affect a wide range of Apple devices, including iPhones, iPads, Macs, Apple Watches, and even the Apple Vision Pro.
Users are strongly urged to update their devices immediately to address these serious security risks.
The first vulnerability, CVE-2025-24200, is an authorization flaw that can be exploited in physical attacks.
It specifically allows malicious actors to disable USB Restricted Mode on a locked device.
Details:
Apple has acknowledged that CVE-2025-24200 has been exploited in highly targeted attacks.
The second vulnerability, CVE-2025-24201, resides in WebKit, the browser engine used by Safari and all iOS browsers.
This flaw is caused by an out-of-bounds write issue that allows maliciously crafted websites to escape the Web Content sandbox.
Details:
The third vulnerability, CVE-2025-24085, is a use-after-free flaw in Apple’s CoreMedia framework, which manages audio and video playback.
Exploiting this vulnerability allows a malicious app to escalate privileges.
Details:
Affected Products
CVE | Affected Products | Impact | CVSS 3.1 Score |
CVE-2025-24200 | iOS 18.3.1, iPadOS 18.3.1, iPadOS 17.7.5, etc. | Bypass USB Restricted Mode | 6.1 (Medium) |
CVE-2025-24201 | iOS 18.3.2, macOS Sequoia 15.3.2, visionOS 2.3.2, Safari 18.3 | Escape Web Content sandbox | 8.1 (High) |
CVE-2025-24085 | iOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3, etc. | Privilege escalation via CoreMedia | 7.8 (High) |
To protect against these vulnerabilities, Apple has released updates across its ecosystem:
How to Update:
To minimize risks associated with these vulnerabilities, Apple recommends the following measures:
These zero-day vulnerabilities underscore the growing sophistication of cyberattacks targeting Apple products.
While Apple’s rapid response demonstrates its dedication to user security, users must stay proactive and vigilant.
Keeping devices up to date is crucial to ensuring ongoing protection against emerging security threats.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed by…
Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking its…
A critical security vulnerability, CVE-2025-31125, has been identified in the Vite development server. Due to improper…
A newly identified Android spyware app is elevating its tactics to remain hidden and unremovable…
Malicious PDF files have emerged as a dominant threat vector in email-based cyberattacks, accounting for…
A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands accused…