• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
apple patches two actively exploited ios flaws used in sophisticated

Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks

You are here: Home / General Cyber Security News / Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks
April 17, 2025

Apple on Wednesday released security updates for iOS, iPadOS, macOS Sequoia, tvOS, and visionOS to address two security flaws that it said have come under active exploitation in the wild.

The vulnerabilities in question are listed below –

  • CVE-2025-31200 (CVSS score: 7.5) – A memory corruption vulnerability in the Core Audio framework that could allow code execution when processing an audio stream in a maliciously crafted media file
  • CVE-2025-31201 (CVSS score: 6.8) – A vulnerability in the RPAC component that could be used by an attacker with arbitrary read and write capability to bypass Pointer Authentication

Cybersecurity

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The iPhone maker said it addressed CVE-2025-31200 with improved bounds checking and CVE-2025-31201 by removing the vulnerable section of code.

Both the vulnerabilities have been credited to Apple, along with Google Threat Analysis Group (TAG) for reporting CVE-2025-31200.

Apple, as is typically the case with such advisories, said it’s aware that the issues have been “exploited in an extremely sophisticated attack against specific targeted individuals on iOS.”

With the latest development, Apple has addressed a total of five actively exploited zero-days in its software since the start of the year –

  • CVE-2025-24085 (CVSS score: 7.8) – A use-after-free bug in the Core Media component that could permit a malicious application already installed on a device to elevate privileges
  • CVE-2025-24200 (CVSS score: 4.6) – An authorization issue in the Accessibility component that could enable an attacker to disable USB Restricted Mode on a locked device as part of a cyber-physical attack
  • CVE-2025-24201 (CVSS score: 7.1) – An out-of-bounds write issue in the WebKit component that could be exploited to break out of the Web Content sandbox using maliciously crafted web content

Cybersecurity

The updates are available for the following devices and operating systems –

  • iOS 18.4.1 and iPadOS 18.4.1 – iPhone XS and later, iPad Pro 13-inch, iPad Pro 13.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later
  • macOS Sequoia 15.4.1 – Macs running macOS Sequoia
  • tvOS 18.4.1 – Apple TV HD and Apple TV 4K (all models)
  • visionOS 2.4.1 – Apple Vision Pro

In light of active exploitation, users are advised to update their devices to the latest version to safeguard against risks.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «experts uncover four new privilege escalation flaws in windows task Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler
Next Post: CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices cisa flags actively exploited vulnerability in sonicwall sma devices»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.