Apple Confirms Zero-Day Exploitation in Targeted Attacks on iPhone Users

Apple Confirms Zero-Day Exploitation in Targeted Attacks on iPhone Users

Apple has issued critical security patches addressing two actively exploited zero-day vulnerabilities affecting iPhone and iPad devices.

The tech giant confirmed that both flaws were leveraged in extremely sophisticated attacks targeting specific individuals before iOS 26 was released.

Critical WebKit Vulnerabilities Under Active Exploitation

The vulnerabilities, tracked as CVE-2025-43529 and CVE-2025-14174, reside in WebKit, Apple’s browser engine powering Safari and in-app web content rendering.

Google’s Threat Analysis Group discovered both security flaws, highlighting the sophisticated nature of the attacks.

CVE ID Component Vulnerability Type Exploitation Status
CVE-2025-43529 WebKit Use-after-free Actively exploited
CVE-2025-14174 WebKit Memory corruption Actively exploited
CVE-2025-46285 Kernel Integer overflow Not known
CVE-2025-46288 App Store Permissions issue Not known
CVE-2025-46287 Calling Framework UI inconsistency Not known
CVE-2025-43539 AppleJPEG Memory corruption Not known
CVE-2025-43542 FaceTime State management Not known
CVE-2025-43518 Foundation Logic issue Not known
CVE-2025-43532 Foundation Memory corruption Not known
CVE-2025-46279 Icons Permissions issue Not known
CVE-2025-43533 Multi-Touch Memory corruption Not known
CVE-2025-43428 Photos Configuration issue Not known
CVE-2025-46277 Screen Time Logging issue Not known
CVE-2025-43538 Screen Time Logging issue Not known
CVE-2025-46276 Messages Information disclosure Not known
CVE-2025-46292 Telephony Entitlement issue Not known

CVE-2025-43529 involves a use-after-free vulnerability that could allow attackers to execute arbitrary code through maliciously crafted web content.

Apple addressed this issue through improved memory management protocols.

The second vulnerability, CVE-2025-14174, centers on memory corruption that could be triggered when processing specially designed web content, which Apple resolved with enhanced validation measures.

The vulnerabilities impact a wide range of Apple devices including iPhone 11 and later models, along with multiple iPad generations.

Specifically, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later are all affected.

Apple’s acknowledgment of active exploitation underscores the critical nature of these vulnerabilities.

The company confirmed these flaws were used in highly targeted attacks against specific individuals, suggesting state-sponsored or advanced persistent threat actors may be involved.

Users of affected devices should immediately update to the latest iOS version to protect against these actively exploited vulnerabilities.

The sophisticated nature of these attacks demonstrates the evolving threat landscape facing mobile device users, particularly high-value targets.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link