Apple Releases Emergency Patches for Zero-Day iOS Security Vulnerabilities
Apple has released emergency security patches to address two actively exploited zero-day vulnerabilities affecting iOS and iPadOS devices. The critical flaws, discovered by Google’s Threat Analysis Group (TAG), enable attackers to execute malicious code and bypass security protections through specially crafted media files and pointer authentication mechanisms.
Table of Contents
Key Takeaways:
- Zero-day vulnerabilities in CoreAudio and RPAC components are being actively exploited in targeted attacks
- The flaws affect all iOS and iPadOS devices running unpatched versions
- Updates iOS 16.6.1 and iPadOS 16.6.1 contain critical security fixes
- Memory corruption vulnerability allows remote code execution through malicious media files
- Google’s TAG team identified both security flaws being used in real-world attacks

Understanding the CoreAudio Vulnerability
The first vulnerability (CVE-2025-31200) exists in Apple’s CoreAudio framework, scoring a CVSS rating of 7.5. This flaw allows attackers to execute arbitrary code by crafting malicious media files. When processed by the system, these files can trigger memory corruption, potentially leading to complete device compromise.
RPAC Security Bypass Details
The second vulnerability (CVE-2025-31201) affects the RPAC component with a CVSS score of 6.8. This flaw enables attackers with arbitrary read and write capabilities to bypass Apple’s pointer authentication system, a crucial security feature designed to prevent code manipulation. Recent iOS security updates have been critical in addressing such vulnerabilities.
Impact and Attack Scenarios
These vulnerabilities pose significant risks, particularly in targeted attack campaigns. The CoreAudio flaw can be exploited remotely through malicious media files, while the RPAC vulnerability requires additional access but can lead to deeper system compromise. Protecting your phone from hacker attacks has become increasingly important given these threats.
Mitigation and Updates
Apple’s swift response includes patches for devices ranging from iPhone 8 to the latest models, along with various iPad generations. Users should immediately update to iOS 16.6.1 or iPadOS 16.6.1. Similar to previous zero-day vulnerabilities targeting Mac users, prompt patching is essential.
Automated Security Solutions
To maintain consistent security monitoring and updates, consider using automation tools like Latenode, which can help streamline security processes and ensure timely response to emerging threats.
Best Practices for iOS Security
Here are essential steps to protect your iOS device:
- Enable automatic software updates
- Install security patches immediately
- Monitor device behavior for suspicious activity
- Back up important data regularly
- Use strong authentication methods