Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw

Apple warns that the WebKIt bug “may have been exploited in an extremely sophisticated attack against specific targeted individuals.”

iPhone security

Apple on Tuesday released iOS 18.3.2 and iPadOS 18.3.2 with an urgent fix for a WebKit flaw that’s already been exploited on older versions of the mobile operating system.

The zero-day, tagged as CVE-2025-24201, allows attackers to break out of the Web Content sandbox and Cupertino warns that it “may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.”

“This is a supplementary fix for an attack that was blocked in iOS 17.2,” the company said in a barebones bulletin.

“For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available,” the company added.

Apple described the bug as an out-of-bounds write issue that was fixed with improved checks to prevent unauthorized actions.

The iOS 18.3.2 rollout comes exactly one month after Apple patched a security flaw that allowed attackers with physical access to a locked iPhone or iPad to disable USB Restricted Mode – a key protection mechanism.

In that case, the company said the bug  led to “an extremely sophisticated attack against specific targeted individuals.” The discovery of the exploit was credited to Bill Marczak of The Citizen Lab at The University of Toronto’s Munk School, suggesting the exploit was used for nation-state level surveillance.

USB Restricted Mode is a security feature designed to block data access via an iPhone or iPad’s Lightning/USB-C port when the device has been locked for over an hour. It was introduced to thwart hacking tools that connect via USB to crack a device’s passcode or extract data. 

Advertisement. Scroll to continue reading.

Related: Apple: USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack 

Related: Apple Confirms Zero-Day Attacks Hitting macOS Systems

Related: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days 

Related: Critical Code-Execution Bugs in Acrobat and Reader

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

SplxAI, a startup focused on securing AI agents, has announced new CISO Sandy Dunn.

Phillip Miller is joining tax preparation giant H&R Block as VP and CISO.

Linx Security has appointed Sarit Reiner Frumkes as Chief Technology Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.