Apple Security Update Fixed Actively Exploited Zero-day Vulnerability Affected iOS, macOS and More

Apple has released updates across its platforms, including iOS 18.3, iPadOS 18.3, macOS Ventura, macOS Sonoma, macOS Sequoia, and Safari, to address multiple vulnerabilities.

These updates include critical fixes for zero-day vulnerabilities that were actively being exploited, as well as other security issues.

Apple has released security updates to address a critical zero-day vulnerability that had been actively exploited in the wild, affecting a wide range of its devices including iPhones, iPads, and Macs.

Google News

One of the most critical fixes addressed a CoreMedia vulnerability (CVE-2025-24085). Apple confirmed that this vulnerability was actively exploited.

It allowed malicious applications to elevate privileges through a “use-after-free” bug. The issue has now been resolved with improved memory management.

The zero-day flaw resides in Apple’s CoreMedia framework, which is central to handling media files on Apple’s operating systems.

According to Apple’s security advisories, this vulnerability could allow attackers to execute arbitrary code by processing maliciously crafted media content.

This could lead to unauthorized access to sensitive user data, potentially compromising privacy and security.

Apple has addressed this vulnerability could potentially allow attackers to execute arbitrary code with kernel privileges on devices running affected versions of

Apple’s acknowledgment of active exploitation underscores the urgency of these updates, urging all users to install them immediately to prevent any further security breaches.

Apple has historically been prompt in addressing zero-day vulnerabilities, often issuing patches outside their regular update schedule. This case is no exception, with the company pushing these security fixes to users globally.

The urgency of the patch deployment highlights Apple’s commitment to user security, especially in light of the increasing sophistication of cyber threats.

“Apple is aware of reports that this issue may have been actively exploited,” the company noted in its security bulletin. This acknowledgment typically implies that the vulnerability was leveraged in targeted attacks, possibly by state-sponsored actors or commercial surveillance vendors.

Summary of Vulnerabilities

ComponentPlatformImpactDescriptionCVE ID
Safari PasswordsmacOS Ventura, SonomaA malicious app may bypass browser extension authenticationLogging issue fixed with improved data redactionCVE-2025-24169
SafarimacOS Ventura, SonomaVisiting malicious sites may lead to address bar spoofingAdditional logic added to prevent spoofingCVE-2025-24128
SafarimacOS Ventura, SonomaVisiting malicious sites may result in user interface spoofingImproved UI to address the issueCVE-2025-24113
WebKitmacOS Ventura, SonomaMalicious webpages may fingerprint usersImproved access restrictions to the file systemCVE-2025-24143
WebKitmacOS Ventura, SonomaProcessing web content may lead to denial-of-serviceMemory-handling improvementsCVE-2025-24158
WebKitmacOS Ventura, SonomaMalicious content may lead to unexpected process crashesImproved state managementCVE-2025-24162
WebKit Web InspectormacOS Ventura, SonomaCopying URLs in Web Inspector may lead to a command injectionImproved file handlingCVE-2025-24150
AccessibilityiOS and iPadOS 18.3Physical access to unlocked device may enable bypass of locked Photos appState management enhancementsCVE-2025-24141
AirPlayiOS, iPadOS, macOS SequoiaRemote attackers could cause denial-of-service or arbitrary code executionImproved input validation and memory handlingCVE-2025-24126, CVE-2025-24137, etc.
CoreMediaiOS, iPadOS, macOS SequoiaParsing files may lead to unexpected app terminationImproved checksCVE-2025-24123, CVE-2025-24124
KerneliOS, iPadOS, macOS SequoiaApps may gain root/kernel privilegesAdditional memory and permissions restrictionsCVE-2025-24107, CVE-2025-24159
SceneKitiOS, iPadOS, macOS SequoiaOut-of-bounds reads may disclose user informationBounds checking improvementsCVE-2025-24149
WebContentFilteriOS, iPadOS, macOS SequoiaOut-of-bounds write may cause system termination or corrupt kernel memoryImproved input validationCVE-2025-24154
ImageIOiOS, iPadOS, macOS SequoiaProcessing images may cause denial-of-serviceEnhanced memory handlingCVE-2025-24086
LaunchServicesiOS, iPadOS, macOS SequoiaApps may fingerprint usersSensitive information redaction improvedCVE-2025-24117
Time ZoneiOS, iPadOS, macOS SequoiaApps may view a contact’s phone number in logsEnhanced private data redactionCVE-2025-24145

Apple users are strongly advised to update their devices immediately to protect against these vulnerabilities. Apple continues its proactive effort in enhancing the security and privacy of its users by addressing such issues comprehensively.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Balaji N
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.