Hold onto your iPhones, folks, because things just got real.
Apple’s security team has been scrambling to patch two nasty zero-day vulnerabilities that were actively exploited in targeted attacks against iPhone users. That’s right, hackers were in the house, exploiting weaknesses in your device before Apple even knew they existed. BleepingComputer has the inside scoop on these chilling exploits and the fixes Apple has rolled out.

Targeted Attacks and the Impact on Users

This week, Apple addressed a critical zero-day vulnerability, CVE-2025-24200, exploited in targeted attacks against iPhone users. These attacks highlight the constant threat posed by sophisticated actors seeking to compromise user data and privacy.

Details of the Exploited Zero-Day: CVE-2025-24200 and its Implications
CVE-2025-24200 is an authorization issue affecting Apple’s Core Media framework, a vital component responsible for media handling across various Apple platforms. This vulnerability enabled attackers to elevate privileges on affected devices, potentially granting them extensive access to sensitive user data and system functionalities.

Citizen Lab’s Role: Unveiling the Targeted Attacks and the Victims
Citizen Lab, a renowned cybersecurity research group, played a crucial role in uncovering these attacks. They reported the zero-day vulnerability to Apple, enabling the company to swiftly release a patch. Citizen Lab’s expertise in investigating targeted spyware campaigns provides invaluable insights into the tactics employed by malicious actors.
The ‘BLASTPASS’ Exploit Chain: A Closer Look at the Pegasus Connection
This vulnerability is the latest in a series of zero-day exploits uncovered by Citizen Lab, often linked to the infamous Pegasus spyware developed by the NSO Group. Citizen Lab previously disclosed two other zero-days, CVE-2023-41061 and CVE-2023-41064, which were exploited as part of an advanced exploit chain dubbed “BLASTPASS”. This chain allowed attackers to infect completely patched iPhones with Pegasus, demonstrating the sophistication and persistence of these targeted attacks.
Apple’s Response: Emergency Patches and Security Enhancements
In response to the discovery of CVE-2025-24200, Apple swiftly released emergency security updates for its various operating systems: iOS 18.3.1, iPadOS 18.3.1, and iPadOS 17.7.5. These updates address the vulnerability, preventing further exploitation.
Addressing the Vulnerability
The security update for CVE-2025-24200 focuses on improving state management within the Core Media framework. This addresses the underlying authorization flaw that allowed attackers to escalate privileges.
Security Enhancements and Best Practices
Apple continuously implements security enhancements to protect its users. In addition to patching vulnerabilities, Apple encourages users to adopt best practices, such as enabling two-factor authentication and keeping their devices updated with the latest security patches.
Impacting Devices: Which iPhones and iPads Need Immediate Attention
This zero-day vulnerability affects a wide range of Apple devices, highlighting the importance of prompt updates for all users. The list of impacted devices includes:
- iPhone XS and later
- iPad Pro 13-inch
- iPad Pro 12.9-inch 3rd generation and later
- iPad Pro 11-inch 1st generation and later
- iPad Air 3rd generation and later
- iPad 7th generation and later
- iPad mini 5th generation and later
- iPad Pro 12.9-inch 2nd generation
- iPad Pro 10.5-inch
- iPad 6th generation
- January 2024: One zero-day patched
- March 2024: Two zero-days patched
- May 2024: One zero-day patched
- November 2024: Two zero-days patched
- Regularly updating software and operating systems to patch known vulnerabilities.
- Employing strong passwords and multi-factor authentication to protect accounts.
- Being cautious about opening email attachments or clicking on links from unknown sources.
- Using reputable antivirus and anti-malware software.
- Educating users about common security threats and best practices.
Given the nature of the vulnerability, it is crucial that users running these devices install the latest security updates immediately.
Beyond USB Restricted Mode: Inactivity Reboot and Other Security Measures
Apple has implemented a number of security features to protect its devices from unauthorized access and data extraction. Beyond USB Restricted Mode, which prevents forensic software from connecting to a locked device, Apple introduced “inactivity reboot” in November 2023. This feature automatically restarts iPhones after extended periods of inactivity, re-encrypting data and making it more challenging for attackers to extract information from a compromised device.
These security measures demonstrate Apple’s commitment to protecting user data and privacy, even in the face of sophisticated attacks.
Apple’s Ongoing Fight Against Zero-Day Exploits: A History of Patches
Apple’s dedication to patching zero-day vulnerabilities is evident in its consistent track record of addressing actively exploited flaws. In 2023, the company patched 20 zero-day vulnerabilities, showcasing its proactive approach to security.
This history of rapid response highlights Apple’s commitment to protecting its users from emerging threats. By diligently addressing vulnerabilities as they are discovered, Apple aims to minimize the potential impact of zero-day exploits.
Zero-Days: The Ever-Present Threat
Zero-day vulnerabilities pose a significant threat to the security of all digital systems. These vulnerabilities are unknown to software developers and vendors, allowing attackers to exploit them before a patch is available. The dynamic nature of the cybersecurity landscape means that new zero-day vulnerabilities are constantly being discovered and exploited.
The Evolving Landscape of Zero-Day Vulnerabilities
The number and sophistication of zero-day vulnerabilities are constantly increasing, driven by advancements in hacking techniques and the growing interconnectedness of digital systems. Attackers are increasingly targeting high-value individuals and organizations, leveraging zero-day exploits to gain unauthorized access to sensitive data or disrupt critical operations.
Staying Ahead of the Curve: Best Practices for Security in the Digital Age
In the face of this evolving threat landscape, it is crucial to adopt a proactive approach to security. This includes:
By implementing these best practices, individuals and organizations can significantly reduce their risk of becoming victims of zero-day attacks.
The Importance of Timely Updates: Protecting Yourself from Targeted Attacks
Timely software updates are essential to mitigating the risk of zero-day exploits. Updates often include patches for newly discovered vulnerabilities, closing security loopholes that attackers could exploit. By promptly installing updates, users can ensure that their devices are protected against the latest threats.
In the case of the recent zero-day vulnerability affecting iPhones and iPads, Apple’s rapid release of security updates demonstrates the importance of staying up-to-date. By installing these updates, users can protect themselves from potentially devastating attacks.
Conclusion
In a recent development, Apple has patched two zero-day vulnerabilities in its iPhone operating system, which were exploited in targeted attacks. As reported by BleepingComputer, these vulnerabilities, identified as CVE-2023-41073 and CVE-2023-41075, allowed attackers to remotely execute code on vulnerable devices. Notably, these zero-days were exploited in combination, highlighting the potential for sophisticated attacks. The patches, released as part of Apple’s latest security update, address the vulnerabilities and prevent exploitation.
The significance of this development cannot be overstated. The exploitation of these zero-days in targeted attacks underscores the evolving nature of cyber threats, particularly those directed at mobile devices. As attackers continually adapt and refine their tactics, it is essential for device manufacturers like Apple to stay ahead of the curve. The patching of these vulnerabilities serves as a testament to Apple’s commitment to prioritizing user security and demonstrates the importance of timely updates and patches in mitigating potential risks. Looking ahead, it is likely that similar vulnerabilities will be discovered, and it is crucial for users to remain vigilant and regularly update their devices to stay protected.
As the threat landscape continues to evolve, it is clear that the cat-and-mouse game between attackers and defenders will persist. Apple’s response to these zero-days serves as a reminder that security is an ongoing process, requiring constant vigilance and adaptation. The patched vulnerabilities are a notable example of the dynamic nature of cybersecurity, where threats are continually emerging, and defenses must adapt to stay ahead. In the end, this serves as a poignant reminder that the security of our digital lives is an ongoing battle that demands our attention and vigilance.