Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Your Score: Simulcast Week of 2025-05-25

June 6, 2025

DOJ files to confiscate alleged North Korea IT worker crypto

June 6, 2025

Bicycle Thieves Child Star Was 85

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks
Cybersecurity

Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks

HarishBy HarishApril 17, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


Apr 17, 2025Ravie LakshmananZero-Day / Vulnerability

Actively Exploited iOS Flaws

Apple on Wednesday released security updates for iOS, iPadOS, macOS Sequoia, tvOS, and visionOS to address two security flaws that it said have come under active exploitation in the wild.

The vulnerabilities in question are listed below –

CVE-2025-31200 (CVSS score: 7.5) – A memory corruption vulnerability in the Core Audio framework that could allow code execution when processing an audio stream in a maliciously crafted media file
CVE-2025-31201 (CVSS score: 6.8) – A vulnerability in the RPAC component that could be used by an attacker with arbitrary read and write capability to bypass Pointer Authentication

Cybersecurity

The iPhone maker said it addressed CVE-2025-31200 with improved bounds checking and CVE-2025-31201 by removing the vulnerable section of code.

Both the vulnerabilities have been credited to Apple, along with Google Threat Analysis Group (TAG) for reporting CVE-2025-31200.

Apple, as is typically the case with such advisories, said it’s aware that the issues have been “exploited in an extremely sophisticated attack against specific targeted individuals on iOS.”

With the latest development, Apple has addressed a total of five actively exploited zero-days in its software since the start of the year –

CVE-2025-24085 (CVSS score: 7.8) – A use-after-free bug in the Core Media component that could permit a malicious application already installed on a device to elevate privileges
CVE-2025-24200 (CVSS score: 4.6) – An authorization issue in the Accessibility component that could enable an attacker to disable USB Restricted Mode on a locked device as part of a cyber-physical attack
CVE-2025-24201 (CVSS score: 7.1) – An out-of-bounds write issue in the WebKit component that could be exploited to break out of the Web Content sandbox using maliciously crafted web content

Cybersecurity

The updates are available for the following devices and operating systems –

iOS 18.4.1 and iPadOS 18.4.1 – iPhone XS and later, iPad Pro 13-inch, iPad Pro 13.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later
macOS Sequoia 15.4.1 – Macs running macOS Sequoia
tvOS 18.4.1 – Apple TV HD and Apple TV 4K (all models)
visionOS 2.4.1 – Apple Vision Pro

In light of active exploitation, users are advised to update their devices to the latest version to safeguard against risks.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticlexAI adds a ‘memory’ feature to Grok
Next Article CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
Harish
  • Website
  • X (Twitter)

Related Posts

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials

June 5, 2025

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

June 5, 2025

Why Business Impact Should Lead the Security Conversation

June 5, 2025

Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware

June 5, 2025

DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown

June 5, 2025

Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Your Score: Simulcast Week of 2025-05-25

June 6, 2025

DOJ files to confiscate alleged North Korea IT worker crypto

June 6, 2025

Bicycle Thieves Child Star Was 85

June 6, 2025

Omada Health prices IPO at $19 per share, in middle of expected range

June 6, 2025
Don't Miss
Blockchain

DOJ files to confiscate alleged North Korea IT worker crypto

June 6, 20253 Mins Read

The US Department of Justice has moved to seize $7.74 million in crypto allegedly earned…

AML Company Finds $15M of Garantex Reserves

June 5, 2025

Can AI agents run the next wave of Web3 ad campaigns? — Interview with Bitmedia

June 5, 2025

Zebec Enhances KYC and AML Compliance Stack with Gatenox Acquisition

June 5, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Cursor’s Anysphere nabs $9.9B valuation, soars past $500M ARR

June 5, 2025

Perplexity received 780 million queries last month, CEO says

June 5, 2025

Anthropic co-founder on cutting access to Windsurf: ‘It would be odd for us to sell Claude to OpenAI’

June 5, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.