Apple’s 3 Zero-Days: If You Haven’t Updated Yet, What Are You Even Doing With Your Life?
So, Apple’s back in the news for the wrong reasons. Again. This time, not because someone couldn’t find the USB-C port, or because your £1,200 iPhone still doesn’t come with a charger. No, this time it's because three—count them—three zero-day vulnerabilities are running riot across iPhones, iPads, Macs, and just about everything else with a bitten fruit stamped on it.
And yes, these vulnerabilities are already being exploited in the wild. Lovely.
Here We Go Again...
Apple, the company that’s spent years cultivating an image of being secure by default, just pushed emergency updates to deal with three new zero-days—CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085.
Don’t bother memorising them. Just know this: if you haven’t updated your kit already, you may as well hand your phone over to a cybercriminal and say, “Here you go mate, help yourself.”
Let’s break it down. And yes, this will get snarky.
CVE-2025-24200 – “Plug It In and Steal Everything”
You’d think by now Apple would have USB security nailed. You’d be wrong.
This vulnerability allows a bad actor with physical access to disable USB Restricted Mode on locked devices. You know that handy feature designed to stop dodgy USB tools from accessing your data without your permission? Yeah, this just switches it off. Brilliant.
All an attacker has to do is plug in their gear, and boom—your ‘secured’ iPhone just rolled over and showed its belly.
It’s like having a burglar alarm with a snooze button.
Affected: iOS 18.3.1 and iPadOS 18.3.1.
Devices: Basically anything from iPhone XS and newer.
CVE-2025-24201 – “Safari’s Escape Room”
This one’s in WebKit, because of course it is.
WebKit, if you're not familiar, is the engine that powers Safari and every other browser-like thing on Apple devices. It's the heart of everything from web apps to email previews.
This little gem lets malicious web content break out of the Web Content sandbox. That’s tech-speak for: your iPhone might think it’s just loading a webpage, but in reality, that webpage is running around the OS like it owns the place.
This was supposed to be dealt with in iOS 17.2. Guess that fix aged like milk.
Affected: iOS 18.3.2, iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.
CVE-2025-24085 – “CoreMedia Has Core Problems”
CoreMedia is responsible for handling your audio and video. Unfortunately, it’s also now responsible for letting malicious applications escalate their privileges—meaning an app could gain access to bits of the OS it has absolutely no business touching.
This one’s a use-after-free bug, which sounds technical and boring, but basically it means your OS is letting apps play around in memory that’s already been chucked in the bin. That’s like asking your dog to guard your steak after it’s eaten it.
Affected: iPhones, iPads, Macs, Apple Watch, Apple TV, and Vision Pro. So basically everything.
So What’s the Risk?
Let’s put it plainly.
If someone has your device and knows what they’re doing, they could extract data via USB.
If you visit a compromised website (which could be anything from a dodgy pop-up ad to a poisoned link), you could end up with malicious code running outside the browser.
And if you’ve downloaded a rogue app (accidentally or through side-loading), it could take over parts of your system.
These aren’t hypothetical. Apple has confirmed all three are being actively exploited.
Yes, you read that right. Not “maybe exploitable in theory”. Actively. In. The. Wild.
What You Should Do (Right Now. Seriously.)
Look, we all know updates are annoying. But when the alternative is “your phone turns into a remote-controlled surveillance device,” you really don’t have an excuse.
Update Everything:
iPhone/iPad: Settings > General > Software Update.
Mac: Apple Menu > System Settings > General > Software Update.
Apple Watch: Use the Watch app on your iPhone.
Apple TV: Settings > System > Software Updates.
Apple Vision Pro (if you’ve already burned cash on this): Update via visionOS settings.
Turn on Automatic Updates.
Yes, they sometimes reboot your device at awkward times, but better that than waking up to find your phone has been emptied out like a smashed car window.
Stop Installing Random Crap
Do not side-load apps from the internet because some TikTok told you it’s the “pro” way. That’s how you get malware. That’s how you get ransomware. That’s how you end up in tears.
Use Lockdown Mode
If you’re in a sensitive role, travelling abroad, or just paranoid enough (fair play), enable Lockdown Mode. It nerfs a lot of features, but also locks down the attack surface.
Apple’s Pattern of “Fix It Later”
Now, if this sounds familiar, that’s because Apple has had a frankly embarrassing streak of zero-days in recent years. For a company that charges the price of a second-hand car for a phone and tries to flog you iCloud+ just for an email alias, the security story is wearing thin.
Let’s be honest: they’ve relied on the “We’re Apple, we’re more secure by default” myth for far too long. And a lot of consumers still believe it.
“iPhones don’t get viruses”
“Oh, Macs are safe from malware”
“Safari is more private”
Stop it. Just stop.
Security is a moving target, and every smug ad campaign about privacy is only going to attract more attention from people who want to break it.
For IT Admins and MSPs
If you’re in IT and you haven’t started pushing these updates to your fleet already, please close this tab and go do it. Now.
Then, when you're done, go have a long hard look at your endpoint management tools. If you’re relying on users to update their devices manually, you're not managing—you're hoping. And hope is not a strategy.
Also, make sure your users can’t disable USB Restricted Mode. And maybe put a real Mobile Device Management (MDM) solution in place while you’re at it.
Wrapping It Up (Before Something Else Explodes)
Look, no system is perfect. Not Apple, not Android, not Windows (definitely not Windows). But the real sin here is complacency.
Apple does move quickly when the press catches wind of these issues. They’re good at damage control. But maybe, just maybe, let’s stop pretending that shiny equals safe.
Zero-days aren’t going away. Attackers are getting smarter. And if you’re walking around with an unpatched device, you’re the low-hanging fruit.
So, have you updated yet?