Apple: Security gap in various operating systems is under attack

There are already vulnerabilities in various Apple operating systems. The company is plugging them with updates.

listen Print view
Zeros and ones, hidden underneath is the character string EXPLOIT

(Image: heise online / dmk)

2 min. read

There is a gaping security hole in various Apple operating systems – and attackers are already exploiting it in the wild. The manufacturer is providing updated operating system versions that patch the vulnerability. Users should ensure that they are installed.

According to Apple, the newly attacked vulnerability affects messages. “A logic error may occur when processing maliciously crafted photos or videos shared via an iCloud link,” the developers write (CVE-2025-43200 / EUVD-2025-18428, CVSS pending, risk rating currently missing). They go on to explain: “Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against certain targets.” Apple solves the problem by having updated operating systems perform improved checks here.

The vulnerability entry is from Monday of this week. However, Apple already updated or published new security notifications for the various operating systems and versions on Thursday last week.

Videos by heise

Another security vulnerability that is mentioned in some security update notifications and has already been abused in attacks concerns the accessibility section. This concerns the USB connection of locked devices, whereby attackers were able to bypass the USB restricted mode; the abuse of this vulnerability was already known in February (CVE-2025-24200 / EUVD-2025-3671, CVSS 6.1, risk “medium”).

The following operating system versions close the newly disclosed vulnerability that has been attacked online

The US IT security authority CISA has already included the vulnerability in the catalog of exploited vulnerabilities (Known Exploited Vulnerabilities Catalogue, KEV).

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.