In first quarter of 2025, Apple users were hit with a series of alarming cybersecurity revelations. Critical vulnerabilities discovered in iPhone, iPad, Mac, and even CarPlay systems once again highlighted how close cyber threats truly are.
🔓 CVE-2025-24085: The Spy in Your Pocket
This vulnerability, a “use-after-free” issue in Apple’s CoreMedia component, allows malicious apps to escalate privileges within the system. It was actively exploited in versions prior to iOS 17.2 and patched by Apple in iOS 18.3, macOS Sequoia 15.3, and other affected systems.
This CVE is in CISA's Known Exploited Vulnerabilities Catalog
Reference CISA's BOD 22-01 and Known Exploited Vulnerabilities Catalog for further guidance and requirements.
Vulnerability Name | Date Added | Due Date | Required Action |
---|---|---|---|
Apple Multiple Products Use-After-Free Vulnerability | 01/29/2025 | 02/19/2025 | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. |
Exploitation Method
Attackers can exploit this vulnerability by sending a specially crafted media file (e.g., in HEIF format) via iMessage to the target device. The victim doesn’t even need to open or preview the message — the attack can be triggered without any interaction ("zero-click"). This bypasses Apple’s BlastDoor security mechanism and enables remote code execution (RCE) via WebKit, as well as manipulation of system settings.
Impact
- Unauthorized access to the user’s keychain data.
- Network settings can be modified to redirect traffic through a malicious proxy.
- Full control of the device may be obtained.
🌐 CVE-2025-24201: The Silent Safari Threat
This “out-of-bounds write” vulnerability in the WebKit engine allows attackers to bypass system security using specially crafted web content. Apple patched this flaw in iOS 18.3.2, macOS Sequoia 15.3.2, and Safari 18.3.1.
This CVE is in CISA's Known Exploited Vulnerabilities Catalog
Reference CISA's BOD 22-01 and Known Exploited Vulnerabilities Catalog for further guidance and requirements.
Vulnerability Name | Date Added | Due Date | Required Action |
---|---|---|---|
Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability | 03/13/2025 | 04/03/2025 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
Exploitation Method
Attackers can exploit this flaw by luring users to visit a malicious website. Merely visiting the site is enough to trigger the exploit. This results in bypassing WebKit’s memory boundaries and enables the execution of harmful code.
Impact
- Escape from web content sandbox and access to system resources.
- Execution of malicious code to take control of the device.
- Theft of personal data or surveillance of the device.
🚗 CarPlay & AirPlay: How Safe is Your Vehicle?
The vulnerabilities collectively dubbed "AirBorne" by Oligo Security were found in Apple’s AirPlay protocol. They enable attackers to hijack devices and spread malware, especially over public Wi-Fi networks. While Apple has patched its own products, many third-party AirPlay-enabled devices remain exposed.
- CVE-2025-24252: A use-after-free vulnerability in AirPlay, allowing zero-click remote code execution (RCE).
- CVE-2025-24132: A stack-based buffer overflow in the AirPlay SDK, exploitable in third-party AirPlay devices (e.g., smart TVs, speakers).
- CVE-2025-24206: Authentication bypass vulnerability in AirPlay, allowing unauthorized access.
- CVE-2025-24271: Access control list (ACL) bypass, enabling attackers to send unauthorized AirPlay commands.
These vulnerabilities can be especially dangerous in insecure environments such as public or weakly protected local networks. Many third-party vendors have yet to release fixes, keeping users at risk.
🛡️ What Should You Do?
- Keep Your Devices Updated: Always install the latest security patches provided by Apple.
- Avoid Untrusted Apps: Do not install software from unknown or unreliable sources.
- Use Strong Wi-Fi Passwords: Secure your home and vehicle networks with strong, unpredictable passwords.
- Use Security Software: Keep your antivirus and endpoint protection tools updated on all devices.
Remember, cybersecurity is an ongoing responsibility. Stay alert and informed to keep your Apple devices safe in an increasingly complex threat landscape.