Apple Issues Critical Updates to Fix Actively Exploited Zero-Day Vulnerability

Extended summary

Published: 29.01.2025

Introduction

Apple has recently released critical software updates to address multiple security vulnerabilities, including a significant zero-day flaw that has reportedly been exploited in real-world scenarios. This vulnerability, identified as CVE-2025-24085, affects various Apple devices and is categorized as a use-after-free bug within the Core Media component. Such vulnerabilities can allow malicious applications already installed on a device to gain elevated privileges, posing a serious threat to user security.

Details of the Vulnerability

The specific vulnerability CVE-2025-24085 has been acknowledged by Apple, which stated that it may have been actively exploited against versions of iOS prior to iOS 17.2. This indicates that devices running older operating systems are particularly at risk. Apple’s advisory was succinct, confirming awareness of the issue but lacking detailed information on the nature of the attacks or the entities behind them. The company has implemented enhanced memory management strategies in its recent software updates to mitigate this vulnerability.

Affected Devices and Software Versions

The updates to rectify the identified vulnerabilities are applicable to a range of devices and operating systems. Specifically, the following versions have received the necessary patches:

  • iOS 18.3 and iPadOS 18.3: iPhone XS and later, iPad Pro models (13-inch, 12.9-inch 3rd generation and later, 11-inch 1st generation and later), iPad Air (3rd generation and later), iPad (7th generation and later), and iPad mini (5th generation and later).
  • macOS Sequoia 15.3: All Macs running this version.
  • tvOS 18.3: Apple TV HD and Apple TV 4K (all models).
  • visionOS 2.3: Apple Vision Pro.
  • watchOS 11.3: Apple Watch Series 6 and later.

Additional Security Flaws Addressed

In addition to the zero-day vulnerability, Apple’s updates also tackle five other security flaws related to AirPlay, as reported by security researcher Uri Katz from Oligo Security. These flaws could potentially allow attackers to execute denial-of-service (DoS) attacks or arbitrary code execution under certain conditions. Furthermore, Google's Threat Analysis Group (TAG) identified three vulnerabilities in the CoreAudio component, which could lead to unexpected app terminations when processing specially crafted files.

Conclusion

With CVE-2025-24085 marked as actively exploited, it is imperative for users of Apple devices to promptly apply the latest software updates to protect against potential security threats. The ongoing discovery of vulnerabilities highlights the importance of maintaining up-to-date software and the need for robust security measures across all platforms. As cyber threats continue to evolve, companies like Apple remain vigilant in addressing these challenges to safeguard their users.

Source: Internet

Top Headlines 29.01.2025