Apple has released iOS 18.4.1 and iPadOS 18.4.1 to address two critical zero-day vulnerabilities that were actively exploited in highly targeted, sophisticated attacks against specific individuals iPhone. The vulnerabilities, identified in the CoreAudio and RPAC components, could allow attackers to execute arbitrary code or bypass security protections on affected devices. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.” Apple said. As cyber threats continue to evolve, Apple’s swift response to these zero-day exploits underscores the critical role of timely updates in safeguarding user privacy and security. According to Apple, processing a maliciously crafted media file could trigger a memory corruption issue, potentially leading to code execution. Apple, in collaboration with Google’s Threat Analysis Group, confirmed reports that this flaw was exploited in an advanced attack targeting select iOS users. Apple noted that this issue was also exploited in the same targeted campaign and has been mitigated by removing the vulnerable code. While Apple has not disclosed specific details about the attacks, the company described them as “extremely sophisticated” and directed at specific individuals, suggesting a possible state-sponsored or highly resourced threat actor. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The second vulnerability, CVE-2025-31201, affects RPAC (Return-oriented Programming Attack Countermeasure), a security mechanism designed to protect against exploits. Apple emphasized its policy of not disclosing security issues until patches are available to protect users. For more information on Apple’s security practices, users can visit the Apple Product Security page. The company’s security release notes, published on April 16, 2025, provide detailed information about the vulnerabilities and affected devices. This flaw could allow an attacker with arbitrary read and write capabilities to bypass Pointer Authentication, a feature that safeguards against code manipulation. Such zero-day exploits, which leverage previously unknown vulnerabilities, are often used in espionage or targeted cyber campaigns due to their complexity and cost. Apple strongly recommends all eligible users update as soon as possible to ensure protection against these vulnerabilities. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security. “Processing an audio stream in a maliciously crafted media file may result in code execution.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 16 Apr 2025 22:00:09 +0000