Apple iPhone users were targeted for privilege escalation in the zero-day exploitation of a use-after-free vulnerability affecting Apple’s Core Media framework.

“A malicious application may be able to elevate privileges,” Apple said in the security update description. “Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.”

Apple refrained from adding more details on the real-world exploitation and has yet to attribute the flaw’s discovery to a cybersecurity researcher or firm.

The vulnerability has been assigned a tracker, CVE-2025-24085, and is pending further evaluation to confirm the severity. Use-after-free vulnerabilities are typically serious security flaws arising from improper memory handling.

Patches available through security updates

The consumer electronics giant has released software updates to address the issue, along with several others, and users are advised to apply these updates to avoid exploitation.

On the security updates page, Apple explained that the flaw was “addressed with improved memory management.”

Updates with patches have been rolled out for iPhones (iOs 18.3), iPads (iPadOS 18.3), Macs (macOS Sequoia 15.3), Apple TV(tvOS 18.3), Vision Pro (visionOS 2.3), and Apple Watches (watchOS 11.3).

Given Core Media’s role in handling low-level media operations and interacting with sensitive system resources, critical flaws affecting it are known for potentially allowing code execution, data theft, and device takeover.

Stay updated with SOC News for cutting-edge security innovations and expert industry insights!

Source : https://www.csoonline.com/article/3811322/iphone-users-targeted-in-apples-first-zero-day-exploit-in-2025.html