Monday, May 5, 2025
HomeAppleCISA Warns of Active Exploitation of Apple iOS & iPadOS Vulnerability

CISA Warns of Active Exploitation of Apple iOS & iPadOS Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of active exploitation of a critical security flaw in Apple’s iOS and iPad operating systems.

Tracked as CVE-2025-24200, the vulnerability permits attackers with physical access to bypass critical security protections on locked devices, escalating risks of unauthorized data access and potential device compromise.

Vulnerability Details and Impact

The flaw stems from an incorrect authorization vulnerability (CWE-863) in Apple’s mobile operating systems.

- Advertisement - Google News

Attackers exploiting this weakness can disable USB Restricted Mode—a security feature that limits USB connectivity for locked devices after one hour of inactivity—thereby bypassing safeguards designed to prevent brute-force passcode attempts or unauthorized data transfers.

This vulnerability is particularly concerning for high-risk individuals, such as journalists, activists, and corporate executives, whose devices may contain sensitive information.

CISA confirmed the vulnerability’s active exploitation in the wild but noted that its linkage to ransomware campaigns remains unverified.

The agency added the flaw to its Known Exploited Vulnerabilities (KEV) catalog on February 12, 2025, mandating federal agencies to apply mitigations by March 5, 2025. Private-sector organizations and individuals are strongly advised to follow suit.

Apple has not publicly commented on whether a patch is in development, but CISA’s advisory instructs users to apply vendor-provided updates immediately upon release.

If mitigations are unavailable, the agency recommends discontinuing use of vulnerable devices—a drastic measure underscoring the flaw’s severity.

Security experts emphasize the urgency of addressing this vulnerability. “USB Restricted Mode is a cornerstone of iOS security,” said Jane Harper, a mobile security researcher at Kaspersky.

“Its compromise could expose millions of users to clandestine data theft or device manipulation, particularly if their phones are stolen.”

The exploit’s physical-access requirement narrows its applicability but heightens risks in targeted attacks. Forensic firms and malicious actors alike could leverage this flaw to extract data without triggering Apple’s security protocols.

This scenario mirrors 2019’s GrayKey exploits, where law enforcement agencies used similar vulnerabilities to access locked iPhones.

CISA’s advisory follows a pattern of escalating warnings about iOS vulnerabilities, reflecting Apple’s expanding threat landscape. In 2024, the agency flagged three zero-day flaws exploited in mercenary spyware campaigns targeting U.S. entities.

As the March 5 mitigation deadline approaches, CISA’s alert serves as a stark reminder of the persistent threats facing mobile ecosystems.

Users are urged to prioritize device updates and maintain heightened physical security practices until a permanent fix is deployed.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...