Apple has recently deployed security patches for IOS on iPhones and iPads that address critical zero-day. Update: “CVE-2025-24200 “ fixes an authorization issue that allows a physical attacker to disable USB Restricted Mode on a locked device with any IOS device that hasn’t been unlocked in the past hour.
CVE-2025-24200 is classified as an authorization bypass vulnerability affecting Apple’s iOS and iPadOS. It specifically targets USB Restricted Mode, a security feature designed to prevent unauthorized USB data connections when a device is locked for an extended period.
The vulnerability is due to improper session state validation within lockdownd. When a device is locked, lockdownd is supposed to block all USB-based data access unless the device has been unlocked within the last hour but due to a state desynchronization issue an attacker with physical access can bypass this restriction and establish a trusted connection using a specially crafted USB request.
This is achieved by:
The vulnerability affects a wide range of iPhones and iPads running vulnerable versions of iOS and iPadOS. Below is a breakdown of the devices affected:
The vulnerabilities identified in the DeepSeek iOS app pose significant risks to the security and privacy of users. These findings highlight the immediate need for organizations to prohibit the app’s use to safeguard sensitive data and mitigate potential cyber risks.
Exploiting CVE-2025-24200 can allow unauthorized access to sensitive data on locked iOS and iPadOS devices, compromising the confidentiality and integrity of personal information, messages, photos, and other confidential data. This vulnerability weakens security protections intended to prevent unauthorized data extraction, posing a significant risk to the security of affected devices, particularly in targeted attacks.