Apple Releases Urgent Patch for USB VulnerabilityApple Releases Urgent Patch for USB Vulnerability
The vulnerability could allow a threat actor to disable the security feature on a locked device and gain access to user data.
February 11, 2025
![An iPhone charging on a wooden table An iPhone charging on a wooden table](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb7048c366f2b8feb/67abb90ccd588eda26104a34/iphone1800_Simon_Dack_alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
NEWS BRIEF
Apple has released a security update for a vulnerability that the tech giant reports may have been exploited in an "extremely sophisticated attack."
Not only that, but these attacks targeted specific individuals, though Apple has not provided any further information.
The vulnerability, tracked as CVE-2025-24200, could allow for a physical attack to disable USB Restricted Mode on a locked device.
USB Restricted Mode is a feature that makes it more difficult for threat actors to unlock a user's phone. When active, a phone's lightning port will only allow charging after the device has been locked for more than an hour, meaning that if an unauthorized actor attempted to connect a locked iPhone to a device to access its data, they could only do so with the necessary credentials.
The security update to fix this vulnerability is available for iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch third generation and later, iPad Pro 11-inch first generation and later, iPad Air third generation and later, iPad seventh generation and later, and iPad mini fifth generation and later.
Users of any of these devices should install updates as soon as possible and can check if they're updated to the latest software version by going to their settings.
These kinds of vulnerabilities are usually deployed by commercial spyware vendors, such as Pegasus, to target particular individuals, so the average user shouldn't be concerned about being targeted while the details of the attack remain unpublished. However, if they are published, copycat cybercriminals will try to imitate this attack vector, hence the urgency in updating to the latest version.
Read more about:
News BriefsAbout the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025