Apple is liberated Software updates to solve multiple security drawbacks in their portfolio, including vulnerability with zero day, which is said, was used in the wild.
The vulnerability that is tracked as CVE-2025-24085 has been described as an error without use in Main media A component that could allow the malicious application already installed on the device to increase privileges.
“Apple knows about the report that this issue may be actively exploited against iOS 17.2 versions,” the company said in a deft consultation.
The problem was solved with improving memory management in the following devices and versions of the operating system –
- iOS 18.3 and iPados 18.3 -iphone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch generation, and later, iPad Pro 11-inch Generation, and later, iPad Air 3rd generation, and later, iPad 7th generation and later, and iPad mini 5-generation and later
- MacOS Sequoia 15.3 – Macs that manages MacOS Sequoia
- Tvos 18.3 – Apple TV HD and Apple TV 4K (all models)
- Visionos 2.3 – Apple Vision Pro
- Watchos 11.3 – Apple Watch Series 6 and later
As usual, in the case, there is currently no details about how vulnerability can be used in real attacks, who and who may have been aimed. Apple has not yet attributed to the opening of the lack of a security researcher.
Updates also affect five security deficiencies on the air reported by the Oligo Security Uri Katz researcher, which can be used by the attacker to cause an unexpected cessation of the system (DOS) or arbitrary code.
A group of Google threats analyzing (TAG) has been credited in detecting and reporting three vulnerabilities in the Coreaudio components (CVE-2015-24160, Cve-2025-24161 and Cve-2025-24163), which may lead to an unexpected termination of the application when disassembling A specially designed file.
Using the CVE-2025-2408 with the tag actively operated, Apple devices are recommended to apply patches to protect against potential threats.