Apple has launched iOS 18.3.2, an working system replace that fixes a vulnerability in WebKit, the browser engine utilized by Safari to render internet pages. The flaw allowed malicious code operating contained in the Internet Content material sandbox, an remoted setting for internet processes designed to restrict safety dangers, to affect different elements of the gadget.
Apple beforehand fastened this vulnerability, CVE-2025-24201, with the discharge of iOS 17.2 again in late 2023, however this launch provides a supplemental patch. Within the launch notes for iOS 18.3.2, Apple said that the difficulty has been “addressed with improved checks to stop unauthorized actions.” That very same patch has additionally been utilized in iPadOS 18.3.2, macOS Sequoia 15.3.2, visionOS 2.3.2, and Safari 18.3.1.
“Vulnerabilities in WebKit must be patched rapidly, as it’s the framework that powers Safari and renders different web-based content material,” Adam Boynton, Senior Safety Technique Supervisor at Apple safety agency Jamf, informed TechRepublic in an electronic mail.
“On this explicit flaw, attackers had been in a position to make use of maliciously crafted internet content material to flee the iOS Internet Content material sandbox. Breaking out of a sandbox permits an attacker to entry information in different elements of the working system.”
A mysterious delay: Why did Apple take so lengthy?
It’s not clear why the preliminary repair was not ample or why Apple has solely now launched the replace this week, however the firm does consult with “a particularly subtle assault in opposition to particular focused people on variations of iOS earlier than iOS 17.2” which can have occurred just lately. This implies that state-sponsored hackers have been exploiting the vulnerability to surveil high-profile people, reminiscent of authorities officers, journalists, or senior enterprise executives.
SEE: Why is Apple Taking Authorized Motion Towards UK’s Authorities?
The truth that this replace comes only a month after iOS 18.3.1 and addresses just one safety problem does point out urgency. Cupertino sometimes withholds detailed details about vulnerabilities within the early levels to offer customers time to replace their units. This technique helps stop attackers from exploiting the flaw earlier than the vast majority of customers have secured their techniques with the newest replace.
Curiously, iOS 18.3.1 landed simply in the future after Google launched an replace for its Chrome browser on Mac, Home windows, and Linux units which additionally patches CVE-2025-24201. Like Apple, Google described it as an out-of-bounds write problem for the Mac GPU and famous that it had a excessive affect and is conscious that an exploit for it exists within the wild. It was reported to Google by Apple Safety Engineering and Structure on March 5, so it appears Apple has been working by itself patch for numerous weeks.
Why you need to replace your Apple units now
On high of patching CVE-2025-24201, the Apple replace “addresses a problem which will stop playback of some streaming content material.” Some social media customers have additionally reported that the replace masses with Apple Intelligence, Apple’s bespoke synthetic intelligence system, routinely enabled, even when the consumer had beforehand switched it off. That is irritating some customers who don’t want for his or her information to be analysed by the mannequin, however they can swap it off once more.
Regardless of this, it’s beneficial that Apple customers replace their units as quickly as attainable, particularly these operating an older working system than iOS 17.2, to stop unhealthy actors making an attempt to take advantage of the now-publicised vulnerability. It’s accessible for iPhone XS and all newer iPhones, in addition to iPad Professional (11-inch, third gen and later, and 12.9-inch,1st gen and later), iPad Air (third gen and later), iPad (seventh gen and later), and iPad mini (fifth gen and later).
You need to be prompted concerning the replace routinely, but when not, you may provoke the obtain manually by going to Settings, Common, after which Software program Replace.