Thursday , June 5 2025
3 Zero Da

Apple Warns of 3 Zero Day Vulns Actively Exploited

Apple has issued an urgent security advisory about 3 critical zero-day vulnerabilities—CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085—that are being actively exploited in advanced attacks.

Multiple Apple devices, including iPhones, iPads, and Macs, are affected by these vulnerabilities. Users should update their devices right away to reduce security risks.

CVSS 9.6: IBM QRadar & Cloud Pak Security Flaws Exposed

IBM has issued a security advisory for vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms. These...
Read More
CVSS 9.6: IBM QRadar & Cloud Pak Security Flaws Exposed

ALERT
Thousands of IP addresses compromised nationwide: CIRT warn

As Bangladesh prepares for the extended Eid-ul-Adha holidays, the BGD e-GOV Computer Incident Response Team (CIRT) has issued an urgent...
Read More
ALERT  Thousands of IP addresses compromised nationwide: CIRT warn

New Android Malware ‘Crocodilus’ Targets Banks in 8 Countries

In March 2025, the Threatfabric mobile Threat Intelligence team identified Crocodilus, a new Android banking Trojan designed for device takeover....
Read More
New Android Malware ‘Crocodilus’ Targets Banks in 8 Countries

Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks

Qualcomm has issued security patches for three zero-day vulnerabilities in the Adreno GPU driver, affecting many chipsets that are being...
Read More
Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks

Critical RCE Flaw Patched in Roundcube Webmail

Roundcube Webmail has fixed a critical security flaw that could enable remote code execution after authentication. Disclosed by security researcher...
Read More
Critical RCE Flaw Patched in Roundcube Webmail

Hacker claim Leak of Deloitte Source Code & GitHub Credentials

A hacker known as "303" claim to breach the company's systems and leaked sensitive internal data on a dark web...
Read More
Hacker claim Leak of Deloitte Source Code & GitHub Credentials

CISA Issued Guidance for SIEM and SOAR Implementation

CISA and ACSC issued new guidance this week on how to procure, implement, and maintain SIEM and SOAR platforms. SIEM...
Read More
CISA Issued Guidance for SIEM and SOAR Implementation

Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

The Qualys Threat Research Unit (TRU) found two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities....
Read More
Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

Australia enacts mandatory ransomware payment reporting

New ransomware payment reporting rules take effect in Australia yesterday (May 30) for all organisations with an annual turnover of...
Read More
Australia enacts mandatory ransomware payment reporting

Why Govt Demands Foreign CCTV Firms to Submit Source Code?

Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require...
Read More
Why Govt Demands Foreign CCTV Firms to Submit Source Code?

Significant Vulnerabilities Under Active Exploitation:

CVE-2025-24200:

CVE-2025-24200 is an authorization flaw that allows attackers to disable USB Restricted Mode on a locked device through a physical attack.

According to Apple’s advisory, this vulnerability “may have been exploited in an extremely sophisticated attack against specific targeted individuals”.

Bill Marczak from The Citizen Lab at the University of Toronto’s Munk School discovered and reported the flaw.

A malicious person can turn off USB Restricted Mode on a locked device during a cyber-physical attack.

USB Restricted Mode, added in iOS 11.4.1, stops iOS and iPadOS devices from connecting with accessories if the device hasn’t been unlocked in the last hour. This is an important security feature aimed at blocking forensic tools.

CVE-2025-24201:

CVE-2025-24201 is a vulnerability in WebKit, the browser engine used by Safari and several iOS apps. This out-of-bounds write issue could let malicious web content escape the Web Content sandbox.

Apple calls this “a supplementary fix for an attack blocked in iOS 17.2” and notes that it may have been used in a highly sophisticated attack targeting specific individuals on versions prior to iOS 17.2.

CVE-2025-24085:

CVE-2025-24085 is a use-after-free vulnerability in CoreMedia, the framework that handles audio and video playback on Apple devices. Apple’s advisory states that a malicious application could gain elevated privileges. This vulnerability impacts various Apple operating systems: iOS, iPadOS, macOS, watchOS, and tvOS.

The flaw has been actively exploited against older versions of iOS before iOS 17.2.

Mitigation Steps:

Apple has provided updates for all three vulnerabilities on its devices and operating systems:

Update your devices as follows:
iPhones and iPads: iOS 18.3/iPadOS 18.3 or later
Macs: macOS Sequoia 15.3 or later
Apple Watches: watchOS 11.3 or newer
Apple TVs: tvOS 18.3
Apple Vision Pro: visionOS 2.3 updates

To update device:

Navigate to Settings > General > Software Update.
Enable automatic updates for future patches.

Check Also

Google

Google patched 2 Android zero-days and 60 other flaws

In its April 2025 security update, Google patched 62 vulnerabilities in Android, including two zero-days …

Leave a Reply

Your email address will not be published. Required fields are marked *