Update your iPhone now to solve the safari safety failure


Image: Apple's official YouTube page

Apple has launched iOS 18.3.2, an update of the operating system that sets a vulnerability on Webkit, the browser engine used by Safari to represent web pages. The fault allowed a malicious code that is executed within the Sandbox web content, an isolated environment for web processes designed to limit security risks, to impact other parts of the device.

Apple previously fixed this vulnerability, CVE-2025-24201, with the launch of iOS 17.2 at the end of 2023, but this launch adds a supplementary patch. In communication notes for iOS 18.3.2, Apple declared that the problem has been “approached with improved checks to avoid unauthorized actions.” That same patch has also been applied in ipados 18.3.2, Macos Sequoia 15.3.2, Visits 2.3.2 and Safari 18.3.1.

“Webkit vulnerabilities must quickly patch, since it is the framework that drives Safari and represents another web -based content,” said Adam Boynton, Apple Jamf security strategy manager, Techrepublic in an email.

“In this particular, the attackers were able to use malicious web content to escape the iOS Sandbox web content. Breaking of a sandbox allows an attacker to access data in other parts of the operating system. “

A mysterious delay: why did Apple take so long?

It is not clear why the initial solution was not enough or why Apple has only launched the update this week, but the company refers to “an extremely sophisticated attack against specific specific individuals in iOS versions before iOS 17.2” which may have happened recently. This suggests that computer pirates sponsored by the State have been exploiting vulnerability to people with a high surveillance profile, as government officials, journalists or senior business executives.

See: Why is Apple taking legal actions against the United Kingdom government?

The fact that this update comes only one month after iOS 18.3.1 and addresses only a security problem indicates urgency. Cupertino generally retains detailed information on vulnerabilities in the early stages to give users to update their devices. This strategy helps prevent attackers from exploiting the defect before most users have secured their systems with the last update.

Interestingly, IOS 18.3.1 landed only one day after Google launched an update for its chrome browser in Mac, Windows and Linux devices, which also patches CVE-2025-24201. Like Apple, Google described it as a writing problem outside the limits for the Mac GPU and pointed out that it had a high impact and is aware that there is an exploit for it in nature. He was informed to Google by Apple Security Engineering and Architecture on March 5, so it seems that Apple has been working on its own patch for several weeks.

Why should you update your Apple devices now

In addition to the CVE-2025-24201 patch, the Apple update “addresses a problem that can avoid the reproduction of some transmission content.” Some social media users have also reported that the update is loaded with Apple Intelligence, the Apple's artificial intelligence system, automatically enabled, even if the user had previously disconnected it. This is frustrating some users who do not want the model to analyze their data, but can turn them off again.

In spite of this, it is recommended that Apple users update their devices as soon as possible, especially those that execute an previous operating system that IOS 17.2, to prevent bad actors from trying to exploit the vulnerability now publicized. It is available for iPhone XS and all the newest iPhones, as well as iPad Pro (11 inches, third generation and later, and 12.9 inches, 1st generation and later), iPad Air (3rd gene and later), iPad (7th generation and posterior) and iPad Mini (5th gene and later).

You must receive the application on the update automatically, but if not, you can start the download manually going to configuration, general and then software update.

scroll to top