2025-03-11
Apple Patches Exploited Zero-Day in Webkit
Apple has patched a zero-day vulnerability in the Webkit browser engine after receiving a report of its exploitation in "an extremely sophisticated attack against targeted individuals." CVE-2025-24201, still awaiting CVSS assessment, would allow an attacker to break out of the Web Content sandbox using maliciously crafted web content, due to an out-of-bounds write issue in versions of iOS before iOS 17.2. Apple notes the update "is a supplementary fix for an attack that was blocked in iOS 17.2," fixed in iOS and iPadOS 18.3.2, with improved checks to prevent unauthorized actions. Devices impacted are "iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later." Dan Goodin at Ars Technica posits that "users facing the biggest threat are likely those who are targets of well-funded law enforcement agencies or nation-state spies."
Editor's Note
If you have Apple Intelligence disabled: Double-check after applying the patch to ensure that it is still disabled.

Johannes Ullrich
Apple fixes to iOS are fairly timely and non-disruptive. Most Apple users should enable automatic updates <settings, general, software update, automatic updates, on.> Development tools may deserve a little more scrutiny.

William Hugh Murray
You almost forget that safari has such a significant dominance in the market, but it does. Patching your device would be the obvious thing, but it's common for users not to fix their iPhones.

Moses Frost
The same flaw is addressed in Safari 18.3.1, MacOS 15.3.2, and visionOS 2.3.2. Note watchOS gets a pass this time. Apple says this is being exploited actively.
