{"id":38998,"date":"2025-08-23T12:17:44","date_gmt":"2025-08-23T10:17:44","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=38998"},"modified":"2025-08-23T12:17:44","modified_gmt":"2025-08-23T10:17:44","slug":"apple-released-critical-security-updates-ios-macos","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/08\/23\/apple-released-critical-security-updates-ios-macos\/","title":{"rendered":"Apple released critical security updates (iOS, macOS)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"margin: 0px 10px 0px 0px; display: inline; float: left;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2012\/07\/Apple.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/08\/22\/apple-veroeffentlicht-kritische-sicherheits-updates-ios-macos\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A brief update from this week: On August 20, 2025, Apple released updates for iOS and iPadOS that address critical vulnerabilities in the operating systems. Here is some information.<\/p>\n<p><!--more--><\/p>\n<p>The update to iOS 18.6.2 and iPadOS 18.6.2 closed vulnerability <a href=\"https:\/\/support.apple.com\/en-us\/124925\" target=\"_blank\" rel=\"noopener\">CVE-2025-43300<\/a> in the Image I\/O framework, which enables apps to read and write most image file formats.<\/p>\n<p>An out-of-bounds write allowed attackers to use the vulnerability to send input to a program in order to write data outside the allocated memory buffer. This could cause the program to crash, corrupt data, or, in the worst case, execute remote code. Apple is aware of a report that this issue may have been exploited in a highly sophisticated attack targeting specific individuals.<\/p>\n<p>The update is available for iPhone XS and newer, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and newer, iPad Pro 11-inch 1st generation and newer, iPad Air 3rd generation and newer, iPad 7th generation and newer, and iPad mini 5th generation and newer.<\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-emergency-updates-fix-new-actively-exploited-zero-day\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/i.postimg.cc\/cL6frRt2\/image.png\" alt=\"Apple Sicherheitsupdates\" width=\"581\" height=\"447\" \/><\/a><\/p>\n<p>The colleagues at Bleeping Computer pointed this out <a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-emergency-updates-fix-new-actively-exploited-zero-day\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. They report that Apple has released updates to prevent exploitation in iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, and macOS Ventura 13.7.8. Users should therefore update the affected Apple devices as soon as possible. Malwarebytes has published <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2025\/08\/all-apple-users-should-update-after-company-patches-zero-day-vulnerability-in-all-platforms\" target=\"_blank\" rel=\"noopener\">some information<\/a> on this.<\/p>\n<blockquote><p>Google's Gemini also had a vulnerability (prompt injection) in the CLI for scaling images, as I <a href=\"https:\/\/www.theregister.com\/2025\/08\/21\/google_gemini_image_scaling_attack\/\" target=\"_blank\" rel=\"noopener\">read<\/a> at The Register.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>[German]A brief update from this week: On August 20, 2025, Apple released updates for iOS and iPadOS that address critical vulnerabilities in the operating systems. Here is some information.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,26,923,580,22],"tags":[116,27,1232,69,195],"class_list":["post-38998","post","type-post","status-publish","format-standard","hentry","category-devices","category-ios","category-macos","category-security","category-update","tag-apple","tag-ios-2","tag-macos","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/38998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=38998"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/38998\/revisions"}],"predecessor-version":[{"id":38999,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/38998\/revisions\/38999"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=38998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=38998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=38998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}