Close Menu
Digpu News  Agency Feed
    Facebook X (Twitter) Instagram
    • Home
    • Technology
    • USA
    • Business
    • Education
    • Startups and Entrepreneurs
    • Health
    Facebook X (Twitter) Instagram
    Digpu News  Agency Feed
    Subscribe
    Friday, January 2
    • Home
    • Technology
    • USA
    • Business
    • Education
    • Startups and Entrepreneurs
    • Health
    Digpu News  Agency Feed
    Home»Business»Apple Patches 2 Exploited iOS Zero-Days in CoreAudio and RPAC
    Business

    Apple Patches 2 Exploited iOS Zero-Days in CoreAudio and RPAC

    DeskBy DeskAugust 8, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
    Share
    Facebook Twitter Pinterest Email Copy Link

    Apple has deployed emergency security patches on Wednesday across its operating systems, scrambling to fix a pair of zero-day vulnerabilities confirmed to be under active exploitation. The company acknowledged that the flaws, affecting core audio processing and a specific processor security feature, were weaponized in targeted campaigns.

    In its advisory, Apple noted it was aware of reports that “this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.” The critical updates target not just iOS and iPadOS, but also macOS, tvOS, and visionOS, signaling the widespread nature of the underlying issues.

    Audio Flaw Allows Code Execution

    One vulnerability, identified as CVE-2025-31200, creates a serious risk through Apple’s CoreAudio framework. This memory corruption defect means attackers could potentially run arbitrary code on a device if a user simply processes a carefully crafted, malicious audio file. This type of exploit could lead to data theft or broader system compromise.

    Reflecting the potential severity, CISA-ADP assigned the flaw a CVSS 3.1 score of 7.5 (High), citing high potential impacts on confidentiality, integrity, and availability, although its vector requires user interaction and has high complexity. Apple stated this vulnerability was addressed through “improved bounds checking” and credited its discovery to both internal teams and Google’s Threat Analysis Group (TAG).

    Processor Security Feature Bypassed

    The second issue, CVE-2025-31201, targets the Reconfigurable Processing Architecture Core (RPAC) found in newer Apple Silicon chips. This vulnerability allowed attackers who had already gained read/write access on a device to sidestep Pointer Authentication (PAC).

    PAC is a hardware-level security feature in ARM architectures designed to cryptographically sign pointers, making it harder for attackers to hijack program control flow through techniques like return-oriented programming (ROP). Successfully bypassing PAC could enable deeper system attacks, such as privilege escalation. Apple, which discovered this flaw internally, stated it was fixed by “removing the vulnerable code.”

    Updates Span iPhones, iPads, Macs, Apple TV, and Vision Pro

    Although the active attacks were reported against iOS devices, the patches confirm a wider impact. The fixes are included in iOS 18.4.1, iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, and visionOS 2.4.1.

    Hardware receiving the updates includes iPhone XS and newer models; various iPad Pros (11-inch 1st gen+, 12.9-inch 3rd gen+, 13-inch), iPad Airs (3rd gen+), standard iPads (7th gen+), and iPad minis (5th gen+); along with Apple TV HD, all Apple TV 4K models, and the Apple Vision Pro. Given the confirmation of active exploitation, users are advised to apply these updates swiftly.

    Zero-Days Mount Amidst Growing Apple Threats

    These two flaws mark the fourth and fifth zero-day vulnerabilities Apple has publicly patched in 2025, putting the company on pace to potentially exceed its 2024 total of six (which included flaws used in the Operation Triangulation spying campaign) in just the first few months of the year.

    The previously patched 2025 zero-days were CVE-2025-24085 (January), CVE-2025-24200 (February), and CVE-2025-24201 (March). This uptick occurs as security researchers and reports, like one in March concerning phishing campaigns targeting Mac users, suggest increased attacker interest in Apple’s ecosystem, challenging its past reputation as a less frequent target than Windows. While the current attacks were described as highly targeted, the availability of patches necessitates action from all users with affected devices.

    Source: Winbuzzer / Digpu NewsTex

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
    Previous ArticleGoogle Faces Breakup After Antitrust Loss In Ad Tech Monopoly Case
    Next Article Instagram Launches ‘Blend’ for Shared Reels Discovery Among Friends

    Related Posts

    Business

    Sportswear Fabrics and India’s Challenge

    September 26, 2025
    Read more
    Auto Tech

    Oura Ring vs Apple Watch (2025): Features, Accuracy, & Value Compared

    September 26, 2025
    Read more
    Culture

    American Black Film Festival Returns for Milestone 30th Anniversary

    September 26, 2025
    Read more
    Business

    ESE Entertainment Asset Bombee Achieves Record Revenues

    September 26, 2025
    Read more
    Auto Tech

    Uber partner Momenta pursues fresh capital, targets over $5B valuation

    September 26, 2025
    Read more
    Business

    China Opens Digital Yuan Operations Hub in Shanghai to Drive Global Use

    September 26, 2025
    Read more
    © 2026 ThemeSphere. Designed by ThemeSphere.
    • Home
    • About
    • Team
    • World
    • Buy now!

    Type above and press Enter to search. Press Esc to cancel.