Apple releases emergency update for actively exploited Apple ecosystem vulnerabilities
Take action: Apple just fixed two actively exploited flaws targeting individuals (probably high value targets). Now the cat is out of the bag, the same flaw will quickly be used by all kinds of criminals. So start pathing your Apple devices NOW. The patch is fairly small, so it will complete quickly. Better than being hacked.
Learn More
Apple has released emergency security updates to patch two zero-day vulnerabilities that are actively exploited in what the company describes as an "extremely sophisticated attack" against specific targeted individuals using iOS devices.
Vulnerabilities summary
- CVE-2025-31200: A memory corruption vulnerability in CoreAudio that could allow code execution when processing an audio stream in a maliciously crafted media file.
- CVE-2025-31201: A vulnerability in RPAC that could allow attackers with arbitrary read and write capability to bypass Pointer Authentication (PAC), an iOS security feature designed to protect against memory vulnerabilities.
Apple confirmed that both vulnerabilities were exploited in highly targeted attacks against specific individuals. The company addressed the CoreAudio issue by implementing improved bounds checking, while the RPAC vulnerability was fixed by removing the vulnerable code entirely.
The vulnerabilities were remedied in Apple's latest security bulletin for iOS 18.4.1, iPadOS 18.4.1, tvOS 18.4.1, macOS Sequoia 15.4.1, and visionOS 2.4.1, released on April 16, 2025.
Apple strongly recommends all users install these security updates as soon as possible to protect their devices. The company has not shared additional details regarding how these vulnerabilities were exploited in attacks.