
Apple has rolled out iOS 18.3.2, an OS update that resolves a security loophole in WebKit, the engine that Safari uses for displaying web content. This vulnerability enabled malicious code within the Web Content sandbox, an isolated area for web processes aimed at reducing security risks, to affect other device components.
Prior to this update, Apple had fixed this weakness, referred to as CVE-2025-24201, with the introduction of iOS 17.2 towards the end of 2023, but this recent release adds an extra patch. In the documentation for iOS 18.3.2, Apple mentioned that the problem has been “resolved with enhanced checks to prevent unauthorized actions.” This same patch has also been implemented in iPadOS 18.3.2, macOS Sequoia 15.3.2, visionOS 2.3.2, and Safari 18.3.1.
“Timely patching of WebKit vulnerabilities is essential, as it is the foundation of Safari and is responsible for rendering other web-based content,” according to Adam Boynton, Senior Security Strategy Manager at Apple security firm Jamf, who shared this in an email with TechRepublic.
“In this specific flaw, attackers managed to break out of the iOS Web Content sandbox using crafted web content. Escaping a sandbox grants an attacker access to data in other parts of the OS.”
A puzzling delay: What caused Apple’s extended timeline?
The reason for the inadequate initial fix or why Apple chose to release the update only recently remains unclear. However, the company mentions “an incredibly sophisticated attack targeted at specific individuals using iOS versions predating iOS 17.2,” which indicates recent occurrences. This hints at state-sponsored hackers exploiting the vulnerability to surveil prominent individuals, including government officials, journalists, or senior corporate figures.
SEE: What Is the Reason Behind Apple’s Legal Action Against UK’s Government?
The swift release of this update, just a month after iOS 18.3.1, focusing solely on one security issue underscores the urgency. Cupertino traditionally withholds detailed vulnerability information in the early phases to allow users time to update their devices. This approach helps deter attackers from exploiting the flaw before a significant number of users have secured their systems with the latest update.
Interestingly, iOS 18.3.1 arrived shortly after Google issued an update for its Chrome browser on Mac, Windows, and Linux machines, which also fixes CVE-2025-24201. Like Apple, Google described it as an out-of-bounds write problem affecting the Mac GPU and cited its high severity while acknowledging the existence of an exploit in the wild. Apple Security Engineering and Architecture notified Google of this on March 5, suggesting that Apple has been developing its patch for several weeks.
Reasons to Swiftly Update your Apple Devices
Aside from rectifying CVE-2025-24201, the Apple update “addresses an issue that may prevent playback of some streaming content.” Some users on social media have pointed out that the update introduces Apple Intelligence, Apple’s unique artificial intelligence system, which automatically activates, even if previously disabled by the user. This has caused frustration among users unwilling to have their data analyzed by the model, although they retain the ability to deactivate it.
Despite this, it is advisable for Apple users to update their devices promptly, particularly those operating on an OS version older than iOS 17.2, to prevent malicious entities from exploiting the now-publicized vulnerability. The update is compatible with iPhone XS and subsequent models, as well as specific iPad models. To check for the update, navigate to Settings, General, and then Software Update.
