In partnership with

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.

Learn how to make every AI investment count.

Successful AI transformation starts with deeply understanding your organization’s most critical use cases. We recommend this practical guide from You.com that walks through a proven framework to identify, prioritize, and document high-value AI opportunities.

In this AI Use Case Discovery Guide, you’ll learn how to:

  • Map internal workflows and customer journeys to pinpoint where AI can drive measurable ROI

  • Ask the right questions when it comes to AI use cases

  • Align cross-functional teams and stakeholders for a unified, scalable approach

Apple Patches Two Actively Exploited WebKit Zero-Days Across Its Entire Ecosystem

Apple has released coordinated security updates across iOS, iPadOS, macOS, Safari, and other platforms to address two WebKit vulnerabilities that have been actively exploited in the wild. One of the flaws mirrors a zero-day patched by Google in Chrome earlier this week, underscoring a shared risk across modern browser engines. Apple warns the issues were likely leveraged in highly targeted attacks against specific individuals.

Context

WebKit is Apple’s core browser engine and a foundational component across its ecosystem. Unlike desktop platforms, all browsers on iOS and iPadOS — including Chrome, Firefox, and Edge — are required to use WebKit under the hood. As a result, a single WebKit flaw can expose a wide range of Apple devices simultaneously.

What Happened

On Friday, Apple disclosed and patched two security vulnerabilities that it confirmed were exploited in real-world attacks. The company stated the flaws may have been used in “extremely sophisticated” campaigns targeting select individuals running older versions of iOS.

One of the vulnerabilities had already been addressed by Google in Chrome earlier in the week, suggesting active cross-platform exploitation before public disclosure.

Technical Breakdown

The vulnerabilities addressed are:

  • CVE-2025-43529: A use-after-free flaw in WebKit that could allow arbitrary code execution when processing malicious web content.

  • CVE-2025-14174: A memory corruption issue tied to an out-of-bounds access in the ANGLE graphics library’s Metal renderer, also enabling potential code execution.

Both issues affect WebKit’s handling of crafted web content, meaning an attacker could exploit them simply by luring a victim to a malicious webpage.

The flaws were identified by Apple Security Engineering and Architecture (SEAR) and Google’s Threat Analysis Group (TAG), a unit that frequently investigates state-sponsored and mercenary spyware operations.

Impact Analysis

Because WebKit underpins all browsers on iOS and iPadOS, exploitation could bypass browser choice entirely. Successful attacks may allow remote code execution within the browser context, often a stepping stone toward deeper system compromise when chained with additional vulnerabilities.

Apple confirmed the vulnerabilities were exploited prior to patching, marking them as true zero-days.

Why It Matters

This incident highlights the strategic value of browser engine vulnerabilities for advanced attackers. Web-based exploits offer a low-friction attack vector that requires no user interaction beyond visiting a webpage, making them ideal for surveillance and espionage operations.

The shared nature of WebKit across Apple’s platforms amplifies the risk and reinforces the need for rapid patch adoption.

Expert Commentary

Apple’s attribution to Google TAG strongly suggests the vulnerabilities were discovered during investigations into targeted exploitation, not routine bug hunting. Historically, TAG involvement has correlated with nation-state or commercial spyware campaigns rather than opportunistic cybercrime.

Key Takeaways

  • Apple patched two actively exploited WebKit zero-days across all major platforms

  • One flaw overlaps with a Chrome zero-day fixed earlier this week

  • Exploitation was likely targeted and highly sophisticated

  • All iOS and iPadOS browsers are affected due to WebKit requirements

  • Immediate updates are critical to reduce exposure

  • Apple has now patched nine in-the-wild zero-days in 2025

Keep Reading

No posts found