🚨 CRITICAL ALERT: Active Zero-Day Exploits

Multiple Apple zero-day vulnerabilities (CVSS 8.8-10.0) are under active exploitation in sophisticated attacks targeting iOS, macOS, Safari, and related platforms. CISA has added these to the KEV catalog—immediate patching is mandatory to prevent arbitrary code execution, privilege escalation, sandbox escapes, and memory corruption by nation-state actors and advanced adversaries.

Critical Vulnerabilities (CVSS >= 8.0)

  • CVE-2024-44308 (CVSS: 8.8): Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. Fixed in Safari 18.1.1, iOS 17.7.2/iPadOS 17.7.2, iOS 18.1.1/iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. View NVD | CISA KEV (Added: 2024-11-21)
  • CVE-2025-24085 (CVSS: 10): Use-after-free issue allowing a malicious application to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2. Fixed in iOS 18.3/iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3, watchOS 11.3. View NVD | CISA KEV (Added: 2025-01-29)
  • CVE-2025-24201 (CVSS: 10): Out-of-bounds write allowing malicious web content to break out of Web Content sandbox. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2. Fixed in Safari 18.3.1, iOS 15.8.4/iPadOS 15.8.4, iOS 16.7.11/iPadOS 16.7.11, iOS 18.3.2/iPadOS 18.3.2, iPadOS 17.7.6, macOS Sequoia 15.3.2, visionOS 2.3.2, watchOS 11.4. View NVD | CISA KEV (Added: 2025-03-13)
  • CVE-2025-31200 (CVSS: 9.8): Memory corruption in audio stream processing leading to code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 18.4.1. Fixed in iOS 18.4.1/iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1, watchOS 11.5. View NVD | CISA KEV (Added: 2025-04-17)
  • CVE-2025-31201 (CVSS: 9.8): Vulnerable code removal to prevent attackers with arbitrary read/write from bypassing Pointer Authentication. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS. Fixed in iOS 18.4.1/iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1. View NVD | CISA KEV (Added: 2025-04-17)
  • CVE-2025-31277 (CVSS: 8.8): Improved memory handling to prevent corruption from malicious web content. Fixed in Safari 18.6, iOS 18.6/iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. View NVD | CISA KEV (Added: 2026-03-20)
  • CVE-2025-43300 (CVSS: 10): Out-of-bounds write in malicious image file processing leading to memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. Fixed in iOS 15.8.5/iPadOS 15.8.5, iOS 16.7.12/iPadOS 16.7.12, iOS 18.6.2/iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. View NVD | CISA KEV (Added: 2025-08-21)
  • CVE-2025-43529 (CVSS: 8.8): Use-after-free in web content processing leading to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. Fixed in Safari 26.2, iOS 18.7.3/iPadOS 18.7.3, iOS 26.2/iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. View NVD | CISA KEV (Added: 2025-12-15)

⚡ Immediate Actions Required

Patch ALL affected Apple devices NOW: Prioritize iOS, iPadOS, macOS, Safari, tvOS, visionOS, watchOS updates as listed. Disable web browsing and media processing on unpatched systems. Monitor for anomalous network traffic, unexpected processes, and sandbox violations. Deploy endpoint detection for WebKit/JavaScriptCore exploits. CISA mandates mitigation per vendor guidance—unpatched systems are actively compromised. Enterprise admins: Enforce auto-updates and segment Intel Macs/iOS <17.2.