Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 31, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 31, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 31, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 31, 2025

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025

      I love Elden Ring Nightreign’s weirdest boss — he bargains with you, heals you, and throws tantrums if you ruin his meditation

      May 31, 2025

      How to install SteamOS on ROG Ally and Legion Go Windows gaming handhelds

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025
      Recent

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025

      Filament Is Now Running Natively on Mobile

      May 31, 2025

      How Remix is shaking things up

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025
      Recent

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025

      I love Elden Ring Nightreign’s weirdest boss — he bargains with you, heals you, and throws tantrums if you ruin his meditation

      May 31, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update

    Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update

    February 11, 2025

    CVE-2025-24200

    Apple has issued emergency updates to fix a critical security flaw that is actively being exploited in iOS and iPadOS. On February 10, the tech giant released out-of-band security patches to address a zero-day vulnerability identified as CVE-2025-24200.

    This vulnerability has been deemed a serious security risk, particularly because it could allow attackers to bypass important security protections on locked Apple devices. Apple has confirmed that the flaw has been exploited in the wild, and users are strongly urged to update their devices immediately to avoid falling victim to potential attacks.

    iOS Zero-Day CVE-2025-24200 

    The security flaw is tied to a component of Apple’s USB Restricted Mode, which was introduced in iOS 11.4.1 to prevent unauthorized data access via USB connections. When USB Restricted Mode is activated, an iPhone or iPad that has not been unlocked and connected to an accessory in the last hour will block all USB communication. However, the vulnerability described as CVE-2025-24200 has been exploited by attackers to disable this protective feature, which could allow them to access a device’s data through USB connections even if the device is locked. 

    CVE-2025-24200 vulnerability
    CVE-2025-24200 vulnerability (Source: Apple)

    The issue has been classified as an “authorization issue,” meaning that an attacker could potentially exploit the flaw by gaining unauthorized access to a device’s state management system, disabling USB Restricted Mode. Once the attacker bypasses this security barrier, they could gain unauthorized access to sensitive information stored on the device. This vulnerability is particularly concerning as it requires physical access to the device for exploitation, making it a form of cyber-physical attack. 

    Apple’s emergency updates aim to address this issue with improved state management in the affected systems. The company has not disclosed the specific nature of the attacks or the extent to which the vulnerability has been exploited, but reports indicate that the flaw may have been used in highly targeted and sophisticated attacks, particularly against specific individuals.

    Affected Apple Devices

    The vulnerability impacts a wide range of Apple products, including recent models of iPhones, iPads, and iPad Pro devices. The devices confirmed to be affected by CVE-2025-24200 include iPhone XS and later models, iPad Pro 13-inch (3rd generation and later), iPad Pro 12.9-inch (3rd generation and later), iPad Pro 11-inch (1st generation and later), iPad Air (3rd generation and later), iPad mini (5th generation and later), iPad 7th generation and later, and iPad 6th generation.

    Apple has strongly recommended that users with these devices update their software immediately to the latest version of iOS or iPadOS. The latest versions, iOS 18.3.1 and iPadOS 18.3.1, were both released on February 10, 2025. These updates specifically address CVE-2025-24200 and patch the security loophole in USB Restricted Mode.

    For those who have devices affected by this vulnerability, Apple has provided an easy way to update to the latest software version. The updates can be installed by visiting Settings > General > Software Update on affected devices. Additionally, users are encouraged to enable automatic software updates by navigating to Settings > General > Software Updates > Enable Automatic Updates, ensuring that their devices are protected from future threats. 

    Conclusion

    The CVE-2025-24200 zero-day vulnerability poses a serious security risk by allowing attackers to bypass USB Restricted Mode and access sensitive data on locked devices. Apple’s swift release of iOS 18.3.1 and iPadOS 18.3.1 addresses the issue, but the rapid exploitation of such vulnerabilities highlights the need for users to stay vigilant and update their devices promptly to protect against unauthorized access and potential attacks. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAmsterdam City Tours: Discover the Best of the Dutch Capital
    Next Article 4 Ways to Keep MFA From Becoming too Much of a Good Thing

    Related Posts

    Security

    New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

    June 1, 2025
    Security

    Exploit details for max severity Cisco IOS XE flaw now public

    June 1, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-46619: LFI Vulnerability Affects Multiple Versions of Couchbase Server for Windows

    Security

    China Launches the World’s First AI-Powered Underwater Data Centre: Here’s Why It Matters

    Artificial Intelligence

    Microsoft reveals Copilot for Gaming — coming to the Xbox mobile app for select users in just a few weeks

    News & Updates

    “Not like us”: Samsung clowns Apple Intelligence’s AI eraser feature

    Operating Systems
    GetResponse

    Highlights

    Automated Accessibility Testing: Tools, CI/CD Integration, and Business Benefits

    May 25, 2025

    Almost every site has accessibility problems. Recent large-scale scans of the world’s most-visited pages revealed that more than 94 percent failed at least one WCAG success criterion. At the same time, digital-accessibility lawsuits in the United States exceeded 4,600 last year, most aimed squarely at websites. With an estimated 1.3 billion people living with disabilities,
    The post Automated Accessibility Testing: Tools, CI/CD Integration, and Business Benefits appeared first on Codoid.

    TigerOS – Portuguese Fedora remix

    January 15, 2025

    No, OpenAI’s AGI is not launching soon, “nor have we built it”

    January 20, 2025

    Improve accuracy of Amazon Rekognition Face Search with user vectors

    April 25, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.