Skip to main content

Apple Releases Security Updates for Multiple Products

Security updates include remediation for two exploited zero-day vulnerabilities

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Security updates include remediation for two exploited zero-day vulnerabilities


Threat details

Exploitation of CVE-2025-31200 and CVE-2025-31201

Apple is aware of reports that CVE-2025-31200 and CVE-2025-31201 may have been exploited in extremely sophisticated attacks against specific targeted individuals on iOS.


Introduction

Apple has released security updates to address two exploited zero-day vulnerabilities in multiple Apple products.

Additionally, on 29 April 2025 security researchers published technical details for the 'AirBorne' vulnerability chain in Apple AirPlay. Three vulnerabilities from the AirBorne chain have been added to this cyber alert. If CVE-2025-24252, CVE-2025-24132, and CVE-2025-24206 are chained together, the researchers were reportedly able to achieve 'zero-click' remote code execution.

Technical details available for AirPlay 'AirBorne' RCE vulnerability chain

Security researchers have published technical details for the 'AirBorne' vulnerability chain in Apple AirPlay. Attackers may use these technical details to construct a proof-of-concept exploit. The NHS England National CSOC assesses exploitation as more likely.


Vulnerability details

  • CVE-2025-31200 is an 'out-of-bounds write' vulnerability with a CVSSv3 score of 7.5. If exploited, an unauthorised attacker could process an audio stream in a maliciously crafted media file to achieve code execution on the device. This vulnerability is under exploitation.

  • CVE-2025-31201 is an 'insufficient information' vulnerability with a CVSSv3 score of 6.8. If exploited, an attacker with arbitrary read and write capability could bypass pointer authentication (PAC). This vulnerability is under exploitation.

  • CVE-2025-24252 is a 'use-after-free' vulnerability in AirPlay with a CVSSv3 score of 9.8. If exploited an attacker on the local network could corrupt process memory. This vulnerability is part of the 'AirBorne' exploit chain.

  • CVE-2025-24132 is a vulnerability in the AirPlay software development kit (SDK). If exploited an attacker on the local network could cause an unexpected app termination. This vulnerability is part of the 'AirBorne' exploit chain.

  • CVE-2025-24206 is an 'incorrect authorisation' vulnerability in AirPlay with a CVSSv3 score of 7.7. If exploited an attacker on the local network could bypass authentication policy. This vulnerability is part of the 'AirBorne' exploit chain.


Threat updates

Date Update
30 Apr 2025 Added details for 'AirBorne' vulnerability chain
30 Apr 2025 Added macOS Sonoma and macOS Ventura to Affected Platforms

Remediation advice

Affected organisations are encouraged to review Apple security releases and apply the relevant updates.


Remediation steps

Type Step
Patch

iOS 18.4.1 and iPadOS 18.4.1 | 122282


https://support.apple.com/en-us/122282
Patch

macOS Sequoia 15.4.1 | 122400 


https://support.apple.com/en-us/122400
Patch

macOS Sonoma 14.7.5 | 122374


https://support.apple.com/en-us/122374
Patch

macOS Ventura 13.7.5 | 122375


https://support.apple.com/en-us/122375
Patch

tvOS 18.4.1 | 122401


https://support.apple.com/en-us/122401
Patch

visionOS 2.4.1 | 122402


https://support.apple.com/en-us/122402

Definitive source of threat updates


CVE Vulnerabilities

Last edited: 30 April 2025 11:59 am