Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TwinH: A New Frontier in the Pursuit of Immortality?

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Apple Patch actively utilizes iOS Zero-Day CVE-2025-24200 in an emergency update
Identity

Apple Patch actively utilizes iOS Zero-Day CVE-2025-24200 in an emergency update

userBy userFebruary 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 11, 2025Ravi LakshmananZero Day/Mobile Security

iOS Zero Day

On Monday, Apple released an out-of-band security update to address security flaws on iOS and iPads.

The vulnerability assigned the CVE Identifier CVE-2025-24200 is described as an authorization issue that allows malicious actors to disable USB restriction mode on devices that are locked as part of a cyber-physical attack It’s there.

This suggests that attackers need physical access to the device to take advantage of the flaws. Due to the USB Restriction Mode introduced in iOS 11.4.1, if your Apple iOS and iPads devices are not unlocked, they will not be able to communicate with the connected accessories if they are connected within the past hour Masu.

Cybersecurity

This feature is seen as an attempt to prevent digital forensic tools such as Cellebrite and Graykey, which are primarily used by law enforcement.

In line with this type of recommendation, there are no other details regarding currently available security flaws. The iPhone manufacturer said the vulnerabilities were addressed through improved national control.

However, Apple admitted that it is “aware of reports that this issue could have been exploited in a very sophisticated attack on a particular targeted individual.”

Bill Marcak, a security researcher at the Manx School’s Civic Research Institute at the University of Toronto, is believed to have discovered and reported the defect.

This update is available on the following devices and operating systems –

iOS 18.3.1 and iPads 18.3.1 – iPhone XS and later, iPad Pro 13 inch, iPad Pro 12.9 inch 3rd generation and later, iPad Pro 11 inch 1st generation and later, iPad Air 3rd Generation and later, iPad 7th generation and later, and iPad Mini 5th Generation and subsequent iPads 17.7.5-iPad Pro 12.9 inch 2nd generation, iPad Pro 10.5 inch, iPad 6thent

This development comes just a few weeks after Cupertino resolves another security flaw. This was an invalid bug (CVE-2025-24085) in the core media component (CVE-2025-24085) revealed that it was exploited against iOS versions prior to iOS 17.2.

Apple Software’s Zero Day is weaponized primarily by commercial surveillance ware vendors, and deploys sophisticated programs that allow data to be extracted from victim devices.

Cybersecurity

These tools, such as the NSO group’s Pegasus, are sold as “life-saving techniques” and can fight serious criminal behavior as a way to avoid so-called “dark” issues, but they also have members of the It has been misused to spy. Civil society.

The NSO group has reiterated that Pegasus is not a large-scale monitoring tool, but is approved by “legitimately reviewed intelligence agency and law enforcement agencies.”

In a 2024 transparency report, the Israeli company said it serves 54 customers in 31 countries, 23 of which are intelligence reporting agencies and another 23 are law enforcement agencies. .

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRussia – Ukraine War: List of Major Events – Day 1,083 | News of the Russian-Ukraine War
Next Article North Korea warns retaliation after Busan’s nuclear submarine dock | Nuclear Weapons News
user
  • Website

Related Posts

TwinH: A New Frontier in the Pursuit of Immortality?

July 4, 2025

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

July 4, 2025

AI Agent may be leaking data – Watch this webinar and learn how to stop it

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TwinH: A New Frontier in the Pursuit of Immortality?

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Intestinal bacteria can cleanse the body of toxic PFAS chemicals

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.