On Wednesday, Apple released urgent operating system updates to address two security vulnerabilities that had already been exploited in highly sophisticated attacks targeting a few iOS users.
The vulnerabilities CVE-2025-31200 and CVE-2025-31201 allow for code execution and bypass mitigation on Apple’s iOS, iPadOS, and macOS platforms.
By infosecbulletin
/ Friday , May 9 2025
Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
By infosecbulletin
/ Thursday , May 8 2025
The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
By infosecbulletin
/ Thursday , May 8 2025
SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
By infosecbulletin
/ Thursday , May 8 2025
From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
By infosecbulletin
/ Thursday , May 8 2025
Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
By infosecbulletin
/ Wednesday , May 7 2025
Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
By infosecbulletin
/ Wednesday , May 7 2025
Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
By infosecbulletin
/ Tuesday , May 6 2025
CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
By infosecbulletin
/ Tuesday , May 6 2025
Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
By infosecbulletin
/ Tuesday , May 6 2025
The Cyber Security Club, representing the Department of Computer Science and Engineering at the University of Asia Pacific (UAP), has...
Read More
Apple acknowledged a report indicating that both flaws were exploited in targeted attacks on specific iPhones.
Here’s Apple’s description of the software defects:
CoreAudio (CVE-2025-31200) — Processing an audio stream in a malicious media file could lead to code execution. Apple is aware of reports that this vulnerability may have been exploited in a sophisticated attack on specific iOS users. A memory corruption problem was fixed with better bounds checking, as reported by Google’s Threat Analysis Group (TAG).
RPAC (CVE-2025-31201) — An attacker with read and write access could potentially bypass Pointer Authentication. Apple has been informed of a report suggesting this issue may have been exploited in a sophisticated attack targeting specific individuals on iOS. The problem has been fixed by removing the vulnerable code.
Pointer Authentication is a security feature in some ARM architectures that ensures a pointer hasn’t been tampered with through cryptographic methods.
Vulnerabilities on macOS Sequoia have been fixed, but Apple reports that exploitation has been limited to a few iPhones. As usual, Apple did not provide details or IOCs about these exploits.
Oracle Released Patched for 378 flaws for April 2025