Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Apple Patches Two actively exploited iOS deficiencies used in sophisticated target attacks
Global Security

Apple Patches Two actively exploited iOS deficiencies used in sophisticated target attacks

AdminBy AdminApril 17, 2025No Comments2 Mins Read
Actively Exploited iOS Flaws
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 17, 2025Red LakshmananZero day / vulnerability

Actively exploits iOS deficiencies

Apple on Wednesday liberated Security updates for iOS, iPados, MacOS Sequoia, TVOS and Visionos to solve the two disadvantages of security, which, he said, came under active exploitation in the wild.

The vulnerabilities in question are below –

  • Cve-2025-31200 (CVSS assessment: 7.5) – Memory corruption vulnerability Main audio Frame that can allow the execution of the code when processing audio potato in the abused media file
  • Cve-2025-31201 (CVSS assessment: 6.8) – Vulnerability in the RPAC component that can be used by an attacker with an arbitrary reading and recording capacity Checking of the indexes
Cybersecurity

The iPhone manufacturer said he resorted to CVE-2025-31200 with improved boundaries check and CVE-2025-31201, deleting a vulnerable code.

Both vulnerabilities have been credited with Apple as well as Google Group Group (Tag) for Cve-2025-31200.

Apple, as usual with such recommendations, stated that the problems were “exploited in an extremely difficult attack on specific targets on iOS”.

With the latest Apple development has applied a total of five active zero days in its software since the beginning of the year –

  • Cve-2025-24085 (CVSS assessment: 7.8) -was use of error mainly media companies that can allow the malicious application already installed on the device to raise privileges
  • Cve-2025-24200 (CVSS assessment: 4.6) -Authorization problem in accessibility components that can allow the attacker to disable USB -rolled mode on a blocked device within the cyber -physical attack
  • Cve-2025-24201 (CVSS’s assessment: 7.1)-PROBLEM with the record in the component
Cybersecurity

Updates available for following devices and operating systems –

  • iOS 18.4.1 and iPados 18.4.1 -iphone XS, and later, iPad Pro 13-inch, iPad Pro 13.9-inch 3rd generation, and later, iPad Pro 11-in-gene, and later, iPad Air 3rd generation, and later, iPad 7th generation, and later, and iPad mini 5th generation, and later
  • MacOS Sequoia 15.4.1 – Macs that manages MacOS Sequoia
  • TVOS 18.4.1 – Apple TV HD and Apple TV 4K (all models)
  • Visionos 2.4.1 – Apple Vision Pro

In light of active operation, users are advised to update their devices to the latest version to keep the risks.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.