
Apple has launched iOS 18.3.2, an working system replace that fixes a vulnerability in WebKit, the browser engine utilized by Safari to render net pages. The flaw allowed malicious code working contained in the Net Content material sandbox, an remoted atmosphere for net processes designed to restrict safety dangers, to impression different elements of the system.
Apple beforehand mounted this vulnerability, CVE-2025-24201, with the discharge of iOS 17.2 again in late 2023, however this launch provides a supplemental patch. Within the launch notes for iOS 18.3.2, Apple acknowledged that the problem has been “addressed with improved checks to forestall unauthorized actions.” That very same patch has additionally been utilized in iPadOS 18.3.2, macOS Sequoia 15.3.2, visionOS 2.3.2, and Safari 18.3.1.
“Vulnerabilities in WebKit needs to be patched rapidly, as it’s the framework that powers Safari and renders different web-based content material,” Adam Boynton, Senior Safety Technique Supervisor at Apple safety agency Jamf, informed TechRepublic in an e-mail.
“On this specific flaw, attackers had been ready to make use of maliciously crafted net content material to flee the iOS Net Content material sandbox. Breaking out of a sandbox permits an attacker to entry knowledge in different elements of the working system.”
A mysterious delay: Why did Apple take so lengthy?
It isn’t clear why the preliminary repair was not enough or why Apple has solely now launched the replace this week, however the firm does discuss with “an especially refined assault in opposition to particular focused people on variations of iOS earlier than iOS 17.2” which can have occurred just lately. This implies that state-sponsored hackers have been exploiting the vulnerability to surveil high-profile people, resembling authorities officers, journalists, or senior enterprise executives.
SEE: Why is Apple Taking Authorized Motion Towards UK’s Authorities?
The truth that this replace comes only a month after iOS 18.3.1 and addresses just one safety situation does point out urgency. Cupertino usually withholds detailed details about vulnerabilities within the early levels to present customers time to replace their gadgets. This technique helps forestall attackers from exploiting the flaw earlier than the vast majority of customers have secured their methods with the newest replace.
Curiously, iOS 18.3.1 landed simply sooner or later after Google launched an replace for its Chrome browser on Mac, Home windows, and Linux gadgets which additionally patches CVE-2025-24201. Like Apple, Google described it as an out-of-bounds write situation for the Mac GPU and famous that it had a excessive impression and is conscious that an exploit for it exists within the wild. It was reported to Google by Apple Safety Engineering and Structure on March 5, so it appears Apple has been working by itself patch for quite a few weeks.
Why you must replace your Apple gadgets now
On prime of patching CVE-2025-24201, the Apple replace “addresses a difficulty that will forestall playback of some streaming content material.” Some social media customers have additionally reported that the replace hundreds with Apple Intelligence, Apple’s bespoke synthetic intelligence system, mechanically enabled, even when the person had beforehand switched it off. That is irritating some customers who don’t want for his or her knowledge to be analysed by the mannequin, however they’re able to swap it off once more.
Regardless of this, it’s advisable that Apple customers replace their gadgets as quickly as attainable, particularly these working an older working system than iOS 17.2, to forestall unhealthy actors making an attempt to take advantage of the now-publicised vulnerability. It’s accessible for iPhone XS and all newer iPhones, in addition to iPad Professional (11-inch, third gen and later, and 12.9-inch,1st gen and later), iPad Air (third gen and later), iPad (seventh gen and later), and iPad mini (fifth gen and later).
You need to be prompted in regards to the replace mechanically, but when not, you possibly can provoke the obtain manually by going to Settings, Normal, after which Software program Replace.