H16 News
×
Logo

Stories

Topics
Polls
Our Team
Settings
Feedback
Login

By Swaleha | Published on April 21, 2025

Image Not Found
Technology / April 21, 2025

CISA confirms critical exploits in iPhones and Macs

The US cybersecurity agency CISA has confirmed two critical zero-day vulnerabilities in Apple devices that are being actively exploited. These flaws impact iPhones, iPads, and Macs, allowing attackers to execute malicious code or bypass Apple’s memory protections. Users are urged to patch their devices as soon as updates are available or temporarily stop using affected products until further notice.

The vulnerabilities listed as could let hackers take over devices, spy on users, or steal sensitive data. The scariest part? They don’t need you to click suspicious links. Just playing a malicious media file or opening a poisoned app might be enough.

A fresh warning from the US Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm on two serious zero-day vulnerabilities affecting Apple’s iOS, iPadOS, and macOS devices. These flaws are currently being used in live attacks, and if you’re using an iPhone, iPad, or Mac, you’re potentially at risk.

Audio files that hack your phone?

Let’s start with CVE-2025-31200. According to, this bug lives in the way Apple devices handle audio inside certain media files. Hackers can sneak malicious code into these files. When your device processes one of them, the malware silently gets to work behind the scenes. The attacker could take full control of your device without your knowledge.

The second one? Even worse.

CVE-2025-31201 is the second flaw. It allows attackers to bypass something called Pointer Authentication. That’s a security mechanism built into Apple chips to stop unauthorized code execution. But with this bug, that line of defence gets quietly skipped.

Security analysts haven’t officially tied these bugs to a ransomware group yet, but experts warn that the potential misuse is big. If exploited correctly, attackers can steal private data, take over systems, or plant more malware.

What should you do right now?

CISA says if you use affected Apple devices, keep an eye out for official patches and install them immediately once they are available. If you manage devices for a company, follow cloud security guidance under BOD 22-01 or disconnect vulnerable systems temporarily if no fixes are ready.

The advisory is clear. “Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.”

Stay updated. And maybe avoid downloading that random audio file someone just shared.

Read More:

Mohd Azharuddin to sue HCA after his name removed from Uppal stadium stand

 

logo

HSRNEWS

Instant News. Infinite Insights

© gokakica.in. All Rights Reserved. Designed by Image Computer Academy