Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users

Posted on December 13, 2025December 13, 2025 By CWS

Apple patches two WebKit zero-day flaws actively exploited in refined assaults concentrating on particular iPhone customers operating iOS variations previous to 26.​

The iOS 26.2 and iPadOS 26.2 updates, launched December 12, 2025, handle CVE-2025-43529 and CVE-2025-14174 in WebKit. CVE-2025-43529 includes a use-after-free vulnerability enabling arbitrary code execution through malicious net content material, found by Google Menace Evaluation Group.

CVE-2025-14174 is a associated reminiscence corruption subject, credited to Apple and Google TAG, with each flaws linked to focused spyware and adware campaigns.​

CVE IDComponentImpactDescriptionResearcher(s)CVE-2025-43529WebKitArbitrary code executionUse-after-free, improved reminiscence managementGoogle Menace Evaluation Group ​CVE-2025-14174WebKitMemory corruptionImproved validationApple & Google TAG ​

These flaws have an effect on iPhone 11 and later fashions, plus specified iPad Professional, Air, and mini variants.​

Different Essential Fixes

Apple resolved over 30 vulnerabilities throughout elements like Kernel, Basis, Display Time, and curl. Notable points embrace a Kernel integer overflow (CVE-2025-46285) permitting root privilege escalation, found by Alibaba Group researchers, and a number of Display Time logging flaws exposing Safari historical past or consumer information (CVE-2025-46277, CVE-2025-43538).

WebKit noticed further patches for sort confusion, buffer overflows, and crashes (e.g., CVE-2025-43541, CVE-2025-43501). Open-source flaws in libarchive (CVE-2025-5918) and curl (CVE-2024-7264, CVE-2025-9086) had been additionally addressed.​

ComponentCVE IDImpactKey ResearcherKernelCVE-2025-46285Root privilegesKaitao Xie, Xiaolong Bai ​Display TimeCVE-2025-46277Access Safari historyKirin (@Pwnrin)​MessagesCVE-2025-46276Access delicate dataRosyna Keller​

Affected Units and Mitigation

Impacts span iPhone 11+, iPad Professional 12.9-inch (third gen+), iPad Professional 11-inch (1st gen+), iPad Air (third gen+), iPad (eighth gen+), and iPad mini (fifth gen+).

Customers ought to replace instantly through Settings > Basic > Software program Replace to mitigate dangers from these focused exploits, per patterns seen in prior spyware and adware assaults. Apple notes no particulars on attackers, however collaboration with Google underscores nation-state-level threats.​

ProductAffected VersionsPatched VersionCompatible DevicesiOSBefore 26.2 (exploited pre-26)26.2iPhone 11 and later​iPadOSBefore 26.2 (exploited pre-26)26.2iPad Professional 12.9″ (third gen+), iPad Professional 11″ (1st gen+), iPad Air (third gen+), iPad (eighth gen+), iPad mini (fifth gen+)​

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Apple, Attacks, Exploited, iPhone, Sophisticated, Targeting, Users, Vulnerabilities

Post navigation

Previous Post: Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
Next Post: Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Related Posts

Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT Cyber Security News
SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play Cyber Security News
Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT Cyber Security News
Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware Cyber Security News
CISA Releases Guide to Protect Network Edge Devices From Hackers Cyber Security News
AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild
  • Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users
  • Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
  • Kali Linux 2025.4 Released With 3 New Hacking Tools and Wifipumpkin3
  • Surge in Attacks Targeting RSC-Enabled Services Worldwide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild
  • Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users
  • Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
  • Kali Linux 2025.4 Released With 3 New Hacking Tools and Wifipumpkin3
  • Surge in Attacks Targeting RSC-Enabled Services Worldwide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark