- Published on
Apple Emergency Patches Released for Three Actively Exploited Zero-Day Vulnerabilities
Apple has issued an urgent security advisory concerning three critical zero-day vulnerabilities that have been actively exploited in sophisticated attacks against specific targeted individuals. These vulnerabilities affect a wide range of Apple devices and require immediate attention.
The Actively Exploited Vulnerabilities
CVE-2025-24200: Safari WebKit Vulnerability
- Impact: Safari WebKit engine
- Risk: Could allow attackers to execute arbitrary code
- Affected: All devices running Safari
- Severity: Critical
- Status: Exploited in sophisticated attacks
CVE-2025-24201: WebKit Engine Vulnerability
- Impact: WebKit engine
- Risk: Could allow attackers to execute arbitrary code
- Affected: iOS, macOS, Safari, and Vision Pro
- Severity: Critical
- Status: Exploited in sophisticated attacks
CVE-2025-24085: Accessibility Framework Vulnerability
- Impact: Accessibility framework
- Risk: Could allow physical attackers to disable USB Restricted Mode on locked devices
- Affected: iOS, macOS
- Severity: Critical
- Status: Exploited in sophisticated attacks
What You Need to Do
Apple has released emergency updates for all affected platforms. Users should:
- Update to the latest iOS 18.3.1 and iPadOS 18.3.1
- Update to the latest macOS version
- Update Safari to the latest version
- Update Vision Pro to the latest version
These vulnerabilities are being actively exploited in sophisticated attacks targeting specific individuals. Apple urges all users to update their devices immediately to protect against potential exploitation.
Timeline
- March 13, 2025: Vulnerabilities added to CISA's Known Exploited Vulnerabilities catalog
- March 2025: Apple releases emergency updates
- April 8, 2025: CISA confirms vulnerabilities are being exploited in sophisticated attacks
Impact on Different Apple Devices
iPhones/iPads
- All models running iOS/iPadOS 16.4 and earlier
- Update to iOS/iPadOS 18.3.1
- Security improvements: Safari, WebKit, Accessibility framework
Macs
- All models running macOS Ventura 13.3 and earlier
- Update to the latest macOS version
- Security improvements: Safari, WebKit, Accessibility framework
Apple Watches
- All models running watchOS 9.3 and earlier
- Update to watchOS 9.4
- Security improvements: CoreGraphics
Why These Zero-Days Are Dangerous
These vulnerabilities are particularly concerning because:
- They were actively exploited in sophisticated attacks
- They allow for arbitrary code execution
- They bypass existing security controls
Conclusion
The discovery and patching of these zero-day vulnerabilities highlight the importance of keeping Apple devices updated with the latest security patches. The fact that they were being actively exploited in sophisticated attacks underscores the need for immediate action.
Sources
- Apple Security Updates: iOS 18.3.1 Security Content
- Apple Security Updates: macOS Ventura 13.4 Security Content
- MITRE CVE Database: CVE-2025-24200
- MITRE CVE Database: CVE-2025-24201
- MITRE CVE Database: CVE-2025-24085