Overview
- Advisory CIVN-2025-0163 applies to iOS below 18.6, iPadOS below 17.7.9 or 18.6, macOS Sequoia below 15.6, Sonoma below 14.7.7 and Ventura below 13.7.7, watchOS below 11.6, tvOS below 18.6 and visionOS below 2.6
- Identified vulnerabilities stem from coding errors including type confusion, use-after-free bugs, buffer and integer overflows, race conditions, logic flaws and improper input validation
- Exploits could allow attackers to access sensitive information, bypass security restrictions, escalate privileges, execute arbitrary code or trigger denial-of-service
- Apple has released security patches for all affected platforms, and users can install them via official software updates in device settings
- CERT-In recommends installing the latest fixes immediately and maintaining cyber hygiene by avoiding suspicious apps, monitoring devices and keeping systems up to date