Apple Patches Critical Vulnerabilities in iOS 15 and 16

Apple Patches Critical Vulnerabilities in iOS 15 and 16

Home » News » Apple Patches Critical Vulnerabilities in iOS 15 and 16
Table of Contents
Apple Logo with Shadow of Hand Holding a Lock.
picture ink dropadobe inventory

On Monday, Apple issued crucial safety updates that retroactively deal with three actively exploited zero-day vulnerabilities affecting legacy variations of its working techniques.

CVE-2025-24200

The primary vulnerability, designated CVE-2025-24200, was patched in iOS 16.7.11, iPadOS 16.7.11, iOS 15.8.4, and iPadOS 15.8.4.

CVE-2025-24200 permits a bodily attacker to disable USB Restricted Mode on an Apple system. It is a safety characteristic designed to dam unauthorised information entry by the USB port when the iPhone or iPad is locked for over an hour.

Apple mentioned CVE-2025-24200 “could have been exploited in an especially refined assault in opposition to particular focused people,” hinting at potential involvement from state-sponsored actors aiming to surveil high-value targets similar to authorities officers, journalists, or senior enterprise executives. Though initially patched on February 10 in iOS 18.3.1, iPadOS 18.3.1, and iPad 17.7.5, the vulnerability remained unresolved in older working techniques till now.

SEE: Vital Zero-Day Vulnerabilities Present in These VMware Merchandise

CVE-2025-24201

The second flaw, CVE-2025-24201, was additionally patched in iOS 16.7.11, iPadOS 16.7.11, iOS 15.8.4, and iPadOS 15.8.4.

This flaw is in WebKit, the browser engine utilized by Safari to render net pages. It permits malicious code operating contained in the Internet Content material sandbox —  an remoted setting meant to comprise browser-based threats — to flee and compromise broader system parts.

CVE-2025-24201 was first mitigated in iOS 17.2 in late 2023, adopted by a supplemental patch in iOS 18.3.2, macOS Sequoia 15.3.2, visionOS 2.3.2, and Safari 18.3.1. The flaw has now been retrospectively addressed in iOS and iPadOS 15 and 16.

CVE-2025-24085

CVE-2025-24085, the third vulnerability, was patched in iPadOS 17.7.6, macOS Sonoma 14.7.5, and macOS Ventura 13.7.5.

The use-after-free vulnerability is in Apple’s Core Media, the framework accountable for dealing with media processing duties similar to audio and video playback in apps. It permits attackers to grab management of deallocated reminiscence and repurpose it to execute privileged malicious code..

Initially patched in January, with iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, visionOS 2.3, and tvOS 18.3, Apple has now backported the repair to older techniques.

Different vulnerabilities had been patched in iOS 18.4

Alongside new Apple Intelligence options and emojis, iOS 18.4 — launched on Tuesday — delivers fixes for brand spanking new vulnerabilities, together with:

  • CVE-2025-30456: A flaw within the DiskArbitration framework that allowed apps to escalate their privileges to root.
  • CVE-2025-24097: A flaw in AirDrop that allowed unauthorised apps to entry file metadata, similar to creation dates or person particulars.
  • CVE-2025-31182: A flaw within the libxpc framework that lets apps delete arbitrary information on the system.
  • CVE-2025-30429, CVE-2025-24178, CVE-2025-24173: Flaws that allowed apps to interrupt out of sandbox in Calendar, libxpc, and Energy Providers, respectively.
  • CVE-2025-30467: A flaw in Safari that might permit malicious web sites to spoof the deal with bar.

Apple customers are strongly urged to replace their gadgets instantly to protect in opposition to exploitation of those now-publicised vulnerabilities. Whereas most customers will obtain computerized replace prompts, handbook updates may be carried out by way of Settings, Normal, after which Software program Replace.

author avatar
roosho Senior Engineer (Technical Services)
I am Rakib Raihan RooSho, Jack of all IT Trades. You got it right. Good for nothing. I try a lot of things and fail more than that. That's how I learn. Whenever I succeed, I note that in my cookbook. Eventually, that became my blog. 
share this article.

Enjoying my articles?

Sign up to get new content delivered straight to your inbox.

Please enable JavaScript in your browser to complete this form.
Name