www.itfunk.orgwww.itfunk.orgwww.itfunk.org
  • Home
  • Tech News
    Tech NewsShow More
    The Hidden Sabotage: How Malicious Go Modules Quietly Crashed Linux Systems
    6 Min Read
    Agentic AI: The Next Frontier in Cybersecurity Defense and Risk​
    5 Min Read
    Cybersecurity CEO Arrested for Allegedly Installing Malware on Hospital Computers: A Stark Reminder of Insider Threats
    8 Min Read
    Cybercriminals Hijack Google’s Reputation
    7 Min Read
    Apple and Google Join Forces to Patch Actively Exploited Zero-Day Vulnerabilities in iOS and macOS
    5 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How To Guides
    How To GuidesShow More
    Nviqri Someq Utils Unwanted Application
    4 Min Read
    How to Deal With Rbx.fund Scam
    4 Min Read
    How to Jailbreak DeepSeek: Unlocking AI Without Restrictions
    4 Min Read
    Why Streaming Services Geo-Restrict Content?
    10 Min Read
    Anonymous France Ransomware: A Comprehensive Guide
    9 Min Read
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    IT/Cybersecurity Best PracticesShow More
    Affordable Endpoint Protection Platforms (EPP) for Small Businesses
    5 Min Read
    Outlaw Malware: A Persistent Threat Exploiting Linux Servers
    4 Min Read
    CVE-2024-48248: Critical NAKIVO Backup & Replication Flaw Actively Exploited—Patch Immediately
    6 Min Read
    How to Jailbreak DeepSeek: Unlocking AI Without Restrictions
    4 Min Read
    Microsoft Patches Critical Security Flaws in Azure AI Face Service and Microsoft Account
    5 Min Read
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org. All Rights Reserved.
Reading: Apple and Google Join Forces to Patch Actively Exploited Zero-Day Vulnerabilities in iOS and macOS
Share
Notification Show More
Font ResizerAa
www.itfunk.orgwww.itfunk.org
Font ResizerAa
  • Tech News
  • How To Guides
  • Cyber Threats
  • Product Reviews
  • Cybersecurity for Business
  • Free Scan
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How To Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • Cybersecurity for Business
  • FREE SCAN
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org All Rights Reserved.
www.itfunk.org > Blog > Tech News > Apple and Google Join Forces to Patch Actively Exploited Zero-Day Vulnerabilities in iOS and macOS
Tech News

Apple and Google Join Forces to Patch Actively Exploited Zero-Day Vulnerabilities in iOS and macOS

ITFunk Research
Last updated: April 17, 2025 11:03 pm
ITFunk Research
Share
SHARE

Apple and Google collaborate to fix two critical zero-day vulnerabilities affecting iOS 18.4, macOS Sequoia 15.4, and more. Learn what these flaws are, how they’re being exploited, and how to protect your devices.

Contents
Apple and Google Collaborate to Patch Zero-Day Exploits Actively Targeting iOS and macOSWhat Are Zero-Day Vulnerabilities and Why Should You Care?CVE-2025-31200 – CoreAudio Flaw (Remote Code Execution)Key PointsCVE-2025-31201 – RPAC Bypass (Pointer Authentication Disabled)Why It’s SeriousApple and Google: Rivals United Against Cyber ThreatsAffected Devices and Required UpdatesHow to Update Your Apple Devices Right NowUpdate InstructionsPro Tips to Stay ProtectedWhy These Exploits Are a Game-Changer for iOS/macOS SecurityFinal Thoughts: Update Now or Risk ExploitationStay Informed — Subscribe for Security Alerts

Apple and Google Collaborate to Patch Zero-Day Exploits Actively Targeting iOS and macOS

In a landmark collaboration, Apple and Google have jointly identified and patched two critical zero-day vulnerabilities currently being exploited in the wild. These flaws affect nearly every major Apple platform, including iOS, iPadOS, macOS Sequoia, tvOS, and visionOS.

If you’re using an Apple device, you are at risk until you update. Here’s everything you need to know.


What Are Zero-Day Vulnerabilities and Why Should You Care?

Zero-day vulnerabilities are security flaws that are discovered and exploited before developers have had a chance to patch them. These types of exploits are particularly dangerous because there are no immediate defenses—unless you apply security updates as soon as they’re released.

Apple’s latest emergency patches address the following:

CVE IDAffected ComponentThreat LevelAttack Vector
CVE-2025-31200CoreAudioCriticalMalicious audio file
CVE-2025-31201RPAC (Pointer Authentication)CriticalMemory manipulation

CVE-2025-31200 – CoreAudio Flaw (Remote Code Execution)

This vulnerability allows attackers to deliver maliciously crafted audio files that, when processed by the device, enable arbitrary code execution—in simple terms, it lets an attacker take control of your device.

Key Points

  • Affects CoreAudio, used in nearly all Apple devices.
  • Requires no user interaction beyond playing an infected audio file.
  • Jointly discovered by Apple and Google’s Threat Analysis Group (TAG).

“Just listening to a malicious audio file could give hackers control of your device.”
— Google TAG Security Analyst


CVE-2025-31201 – RPAC Bypass (Pointer Authentication Disabled)

This second flaw attacks Apple’s Pointer Authentication mechanism, a modern hardware-level defense designed to block unauthorized code execution.

Why It’s Serious

  • Allows attackers to bypass key memory protection safeguards.
  • Exploited after initial access is gained—often via another vulnerability like CVE-2025-31200.
  • This makes it particularly dangerous in chain exploits.

Apple and Google: Rivals United Against Cyber Threats

One of the standout aspects of this response is the collaborative discovery of CVE-2025-31200 by Apple and Google TAG.

This partnership highlights the urgent need for inter-company cooperation in the face of increasingly sophisticated attacks.

“We may compete in the marketplace, but when it comes to cybersecurity, we’re allies.”
— Google Threat Analysis Group


Affected Devices and Required Updates

If your Apple device is running older versions of iOS, macOS, tvOS, or visionOS, it may be vulnerable. Here’s a quick summary:

PlatformVulnerable VersionsSafe Version
iOS18.4 and earlier18.4.1
iPadOS18.4 and earlier18.4.1
macOS Sequoia15.4 and earlier15.4.1
tvOS18.4 and earlier18.4.1
visionOS2.4 and earlier2.4.1

How to Update Your Apple Devices Right Now

Don’t delay. These are emergency patches. Updating now could be the difference between a secure system and a compromised one.

Update Instructions

  • iPhone or iPad:
    Settings > General > Software Update
  • Mac (macOS Sequoia):
    System Settings > General > Software Update
  • Apple TV:
    Settings > System > Software Updates
  • Apple Vision Pro:
    Settings > General > Software Update

Pro Tips to Stay Protected

  • ✅ Enable Automatic Updates to ensure you receive security fixes ASAP.
  • 🛡️ Use Lockdown Mode if you’re at high risk (e.g., journalist, executive, activist).
  • 🔐 Avoid playing or downloading audio from unknown sources until fully patched.

Why These Exploits Are a Game-Changer for iOS/macOS Security

Apple’s Pointer Authentication system (RPAC) is one of the most advanced hardware-level protections in the industry. The fact that it can be bypassed makes this threat particularly alarming.

Security FeaturePurposeStatus with CVE-2025-31201
Pointer AuthenticationPrevent unauthorized memory access❌ Bypassed
CoreAudio Bounds CheckingPrevent overflow during audio processing❌ Broken
App SandboxingContain app behavior❌ Compromised via chained exploits

Final Thoughts: Update Now or Risk Exploitation

Zero-day vulnerabilities are some of the most dangerous forms of cyber threats, especially when they’re actively exploited. Apple and Google’s quick response shows how collaboration beats competition when it comes to public safety.

If you haven’t updated your Apple device today, you’re already behind. Take a few minutes, apply the update, and ensure your digital life remains secure.


Stay Informed — Subscribe for Security Alerts

Want real-time updates on zero-day threats and security patches? Subscribe to our newsletter for breaking cybersecurity news.

You Might Also Like

The Hidden Sabotage: How Malicious Go Modules Quietly Crashed Linux Systems
Agentic AI: The Next Frontier in Cybersecurity Defense and Risk​
Cybersecurity CEO Arrested for Allegedly Installing Malware on Hospital Computers: A Stark Reminder of Insider Threats
Cybercriminals Hijack Google’s Reputation
Chinese Cyber Espionage Group UNC5174 Deploys SNOWLIGHT and VShell in Stealthy Linux and macOS Attacks
TAGGED:actively exploited iOS bugApple visionOS 2.4.1 updateApple zero-day CVE-2025-31200CoreAudio exploitCVE-2025-31201emergency Apple patch April 2025Google TAG Apple collaborationiOS 18.4.1 updatemacOS Sequoia security patchRPAC vulnerabilityupdate iPhone now

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article browser hijackers 2712trk.io
Next Article PetyaX Ransomware
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Think You're Infected? Let's Find Out – FAST.
SpyHunter identifies viruses, ransomware, and hidden threats in under a minute.
🛡️ Scan Your Device for Free
✅ Free Scan Available • ⭐ Catches malware instantly
//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Support

Sign Up for Our Newesletter

Subscribe to our newsletter to get our newest articles instantly!

 

www.itfunk.orgwww.itfunk.org
© 2023 www.itfunk.org. All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?