Apple on Tuesday launched a safety replace to deal with a zero-day flaw that it stated has been exploited in “extraordinarily subtle” assaults.
The vulnerability has been assigned the CVE identifier CVE-2025-24201 and is rooted within the WebKit net browser engine element.
It has been described as an out-of-bounds write problem that might enable an attacker to craft malicious net content material such that it will possibly get away of the Net Content material sandbox.
Apple stated it resolved the problem with improved checks to forestall unauthorized actions. It additionally famous that it is a supplementary repair for an assault that was blocked in iOS 17.2.
Moreover, it acknowledged that the vulnerability “might have been exploited in a particularly subtle assault in opposition to particular focused people on variations of iOS earlier than iOS 17.2.”
Nevertheless, the advisory doesn’t point out if Apple’s personal safety crew found the flaw or if it was reported to it by an exterior researcher. It additionally doesn’t point out when the assaults started, how lengthy they lasted, and who was focused.
The replace is obtainable for the next units and working system variations –
- iOS 18.3.2 and iPadOS 18.3.2 – iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later
- macOS Sequoia 15.3.2 – Macs operating macOS Sequoia
- Safari 18.3.1 – Macs operating macOS Ventura and macOS Sonoma
- visionOS 2.3.2 – Apple Imaginative and prescient Professional
With the most recent improvement, Apple has addressed a complete of three actively exploited zero-days in its software program for the reason that begin of the yr, the opposite two being CVE-2025-24085 and CVE-2025-24200.