slider

Urgent iOS Update: Fixing Exploited USB Vulnerability

Apple has released an urgent security patch for iOS and iPadOS, addressing a serious vulnerability that was actively exploited in targeted cyberattacks. The flaw, tracked as CVE-2025-24200, allows an attacker with physical access to a locked iPhone or iPad to disable USB Restricted Mode, a security feature designed to prevent unauthorized data access through the device’s Lightning or USB-C port.

According to Apple’s security team, the exploit was part of an “extremely sophisticated attack” aimed at specific high-value individuals. While details remain limited, the discovery of the flaw was credited to Bill Marczak of The Citizen Lab, a research group known for investigating spyware and nation-state surveillance operations.


How the Exploit Works

USB Restricted Mode, first introduced by Apple to prevent forensic tools from bypassing passcodes and extracting device data, automatically disables USB data connections one hour after a device is locked. This feature effectively renders the Lightning or USB-C port charge-only unless explicitly re-enabled by the user.

However, the newly disclosed vulnerability bypassed this security mechanism, allowing attackers to re-enable data access without needing the device owner’s passcode. In practice, this means a stolen or seized iPhone could be connected to specialized hardware to extract data—potentially putting sensitive information at risk.

Apple classified the flaw as an authorization issue in the operating system’s logic and addressed it through improved state management in iOS 18.3.1 and iPadOS 18.3.1.


Limited Information and High-Risk Targets

As is common with Apple’s security disclosures, the company has not released indicators of compromise (IOCs) or telemetry data that would allow security researchers and defenders to detect past exploitation. Given Citizen Lab’s involvement, the exploit was likely used in nation-state or law enforcement surveillance campaigns rather than widespread cybercrime.

The lack of technical details suggests that Apple wants to limit additional exploitation by preventing further reverse engineering of the attack. However, users who are high-risk targets, such as journalists, activists, or government officials, are strongly advised to update their devices immediately to minimize the chance of compromise.


Mitigation and Next Steps

To protect against CVE-2025-24200, Apple users should:

  • Update to iOS 18.3.1 or iPadOS 18.3.1 as soon as possible.
  • Ensure USB Restricted Mode is enabled under Settings > Face ID & Passcode > “USB Accessories” (should remain toggled off).
  • Use a strong passcode to prevent unauthorized access if a device is physically stolen.
  • Enable Lockdown Mode for extra security if you suspect you are a high-risk target.

As physical access attacks remain a concern for high-profile individuals, ensuring that security measures like USB Restricted Mode, encrypted backups, and remote wipe capabilities are properly configured remains crucial.

While no reports suggest widespread exploitation, this latest attack highlights the importance of keeping devices updated and staying aware of emerging threats targeting mobile security.


How Can Netizen Help?

Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

Questions or concerns? Feel free to reach out to us any time –

https://www.netizen.net/contact


Copyright © Netizen Corporation. All Rights Reserved.