Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Apple Quashes Two Zero-Days With iOS, MacOS Patches

The vulnerabilities are described as code execution and mitigation bypass issues that affect Apple’s iOS, iPadOS and macOS platforms.

Apple AirPlay Airborne vulnerabilities

Apple on Wednesday shipped out‑of‑band operating system updates to fix a pair of security bugs the company says were already exploited in “extremely sophisticated” attacks against a small number of iOS targets.

The vulnerabilities, tagged as CVE-2025-31200 and CVE-2025-31201, are described as code execution and mitigation bypass issues that affect Apple’s iOS, iPadOS and macOS platforms.

Apple said it was aware of a report that both flaws were part of high-end attacks against specific target iPhones.

Here’s Apple’s description of the software defects:

  • CoreAudio (CVE-2025-31200) — Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS. A memory corruption issue was addressed with improved bounds checking.  The company said Google’s TAG (Threat Analysis Group) reported the issue.
  • RPAC (CVE-2025-31201) — An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS. This issue was addressed by removing the vulnerable code.

Pointer Authentication is a security feature in certain ARM architecture that provides a cryptographically strong guarantee about the likelihood that a pointer has been tampered with. 

The vulnerabilities were also patched on all machines running macOS Sequoia but Apple notes that the reported exploitation has only happened on a limited number of iPhones.

As is customary, Apple did not share details or IOCs on the in-the-wild exploitation. 

Related: Apple Suddenly Drops NSO Group Spyware Lawsuit

Related: Microsoft Patches 125 Flaws, Including Exploited CLFS Zero-Day

Advertisement. Scroll to continue reading.

Related: Rapid7 Reveals RCE Path in Ivanti VPNs  After Silent Patch Debacle

Related: Apple Pulls Advanced Data Protection in UK Amid Backdoor Demand

Related: Apple  USB Restricted Mode in ‘Extremely Sophisticated’ Hack 

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cloud and cybersecurity MSP Ekco has appointed Ben Savage as UK CEO.

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.