	{"id":102966,"date":"2025-01-27T23:59:49","date_gmt":"2025-01-28T07:59:49","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=102966"},"modified":"2025-02-10T22:47:25","modified_gmt":"2025-02-11T06:47:25","slug":"ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/","title":{"rendered":"iOS 18.3 and macOS Sequoia 15.3 patch first Apple zero-day of 2025"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-99266 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>On Monday, January 27, Apple released urgent updates for all of its operating systems. The updates add new features and address bugs. But more importantly, they fix some critical security vulnerabilities\u2014including one that was &#8220;actively exploited&#8221; in the wild.<\/p>\n<p>Let&#8217;s explore everything you should know about what Apple changed in these updates.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#sequoia\">macOS Sequoia 15.3<\/a>\n<ul>\n<li><a href=\"#24134\">Details about the zero-day vulnerability, CVE-2025-24134<\/a><\/li>\n<li><a href=\"#24166\">Apple silently removed CVE-2025-24166 from the patch notes<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#sonoma\">macOS Sonoma 14.7.3<\/a><\/li>\n<li><a href=\"#ventura\">macOS Ventura 13.7.3<\/a><\/li>\n<li><a href=\"#saf\">Safari 18.3 for macOS Ventura and Sonoma<\/a><\/li>\n<li><a href=\"#18\">iOS 18.3 and iPadOS 18.3<\/a><\/li>\n<li><a href=\"#17\">iPadOS 17.7.4<\/a><\/li>\n<li><a href=\"#wat\">watchOS 11.3<\/a><\/li>\n<li><a href=\"#tv\">tvOS 18.3<\/a><\/li>\n<li><a href=\"#visionos\">visionOS 2.3<\/a><\/li>\n<li><a href=\"#notpatched\">What Apple didn&#8217;t patch<\/a><\/li>\n<li><a href=\"#howinstall\">How to install Apple security updates<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"sequoia\"><\/a><\/li>\n<\/ul>\n<h3>macOS Sequoia 15.3<\/h3>\n<p><strong>Available for: <\/strong>All supported Macs capable of running macOS Sequoia<\/p>\n<p><strong>General update information and new features:<\/strong><\/p>\n<p class=\"gb-paragraph\">This update introduces Genmoji, powered by Apple Intelligence, and also includes other enhancements, bug fixes, and security updates for your Mac.<\/p>\n<ul class=\"list gb-list\">\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">Genmoji creation in Messages and other apps<\/p>\n<\/li>\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">Calculator repeats the last mathematical operation when you click the equal sign again<\/p>\n<\/li>\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">Easily manage settings for notification summaries from the Lock Screen (Mac with Apple silicon)<\/p>\n<\/li>\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">Updated style for summarized notifications better distinguishes them from other notifications by using italicized text as well as the glyph (Mac with Apple silicon)<\/p>\n<\/li>\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">Notification summaries for News &amp; Entertainment apps are temporarily unavailable, and users who opt-in will see them again when the feature becomes available (Mac with Apple silicon)<\/p>\n<\/li>\n<\/ul>\n<p><strong>Enterprise-specific details:<\/strong><\/p>\n<ul class=\"list gb-list\">\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">Apple Intelligence is turned on automatically after updating to macOS 15.3 or during device setup unless MDM* skips the Apple Intelligence setup pane<\/p>\n<\/li>\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">MDM can require sign-in from a specified Workspace ID for requests to external intelligence integrations such as ChatGPT<\/p>\n<\/li>\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">MDM can disable transcription summarization in Notes<\/p>\n<\/li>\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">AirPlay connects successfully when using the built-in firewall and a content filter extension<\/p>\n<\/li>\n<li class=\"gb-list_item\">\n<p class=\"gb-paragraph\">Improves stability for apps over VPN connections when using the built-in firewall and a content filter extension<\/p>\n<\/li>\n<\/ul>\n<p>*MDM is short for &#8220;mobile device management&#8221; solutions, which businesses use to manage and track Apple devices.<\/p>\n<h4><strong>Security fixes in macOS Sequoia 15.3<\/strong><\/h4>\n<p>In this update, Apple addressed at least 60 vulnerabilities with CVE (Common Vulnerabilities and Exposures) numbers assigned to them. Here are a handful of notable ones:<\/p>\n<blockquote>\n<p class=\"gb-header\"><strong>AirPlay<\/strong><br \/>\nImpact: An attacker in a privileged position may be able to perform a denial-of-service<br \/>\nDescription: The issue was addressed with improved memory handling.<br \/>\nCVE-2025-24131: Uri Katz (Oligo Security)<\/p>\n<p>&nbsp;<\/p>\n<p class=\"gb-header\"><strong>CoreMedia<\/strong><br \/>\nImpact: A malicious application may be able to elevate privileges. <strong><span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.<\/span><\/strong><br \/>\nDescription: A use after free issue was addressed with improved memory management.<br \/>\nCVE-2025-24085<\/p>\n<p>&nbsp;<\/p>\n<p class=\"gb-header\"><strong>FaceTime<\/strong><br \/>\nImpact: An app may be able to access user-sensitive data<br \/>\nDescription: An information disclosure issue was addressed with improved privacy controls.<br \/>\nCVE-2025-24134: Kirin (@Pwnrin)<\/p>\n<p>&nbsp;<\/p>\n<p class=\"gb-header\"><strong>Messages<\/strong><br \/>\nImpact: An app may be able to access user-sensitive data<br \/>\nDescription: This issue was addressed with improved redaction of sensitive information.<br \/>\nCVE-2025-24101: Kirin (@Pwnrin)<\/p>\n<p>&nbsp;<\/p>\n<p class=\"gb-header\"><strong>Spotlight<\/strong><br \/>\nImpact: A malicious application may be able to leak sensitive user information<br \/>\nDescription: This issue was addressed through improved state management.<br \/>\nCVE-2025-24138: Rodolphe BRUNETTI (@eisw0lf) of Lupus Nova<\/p>\n<\/blockquote>\n<p>For the full list of security patches included in macOS Sequoia 15.3, <a href=\"https:\/\/support.apple.com\/en-us\/122068\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get macOS Sequoia 15.3 by going to <strong>System Settings<\/strong> &gt; <strong>Software Update<\/strong>, where compatible Macs running macOS Mojave or newer will see the Sequoia update appear. If you have a compatible Mac running macOS High Sierra or older, look for <a name=\"24134\"><\/a>macOS Sequoia in the App Store and download it from there.<\/p>\n<h4><strong>Details about the zero-day vulnerability, CVE-2025-24134<\/strong><\/h4>\n<p>We don&#8217;t know much at this time about the &#8220;actively exploited&#8221; (zero-day) vulnerability, CVE-2025-24134. Besides the description above, we only know that macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3, tvOS 18.3, and visionOS 2.3 include fixes for this bug.<\/p>\n<p>Apple released the referenced iOS 17.2 in December 2023, meaning this vulnerability was used in the wild at least 13 months before Apple finally assigned a CVE number and made the patch available. It&#8217;s possible that CVE-2025-24134 may have been used as <a name=\"24166\"><\/a>part of an exploit chain leveraged by <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/pegasus\/\">Pegasus<\/a> or similar nation-state caliber spyware.<\/p>\n<h4><strong>Apple silently removed CVE-2025-24166 from the patch notes<\/strong><\/h4>\n<p>Note that Apple originally listed 61 CVEs in macOS Sequoia 15.3, but later removed the following CVE from the patch notes for all operating systems. Apparently, based on <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24166\" target=\"_blank\" rel=\"noopener\">notes<\/a> in NIST&#8217;s National Vulnerability Database, Apple must have quietly &#8220;withdrawn&#8221; this CVE:<\/p>\n<blockquote><p><strong>libxslt<\/strong><br \/>\nFormerly listed as patched in: macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, iOS 18.3 and iPadOS 18.3, iPadOS 17.7.4, and visionOS 2.3<br \/>\nImpact: Processing maliciously crafted web content may lead to an unexpected process crash<br \/>\nDescription: This issue was addressed through improved state management.<br \/>\nCVE-2025-24166: Ivan Fratric of Google Project Zero<\/p><\/blockquote>\n<p><a name=\"sonoma\"><\/a>Intego has requested details about why Apple withdrew this CVE, and will update this article if anyone provides an answer.<\/p>\n<h3>macOS Sonoma 14.7.3<\/h3>\n<p><strong>Available for: <\/strong>All supported Macs currently running macOS Sonoma<\/p>\n<p><strong>Security fixes:<\/strong><br \/>\nIn this update, Apple addressed at least 41 vulnerabilities with CVEs assigned. Most of them are the same as those found in the Sequoia update.<\/p>\n<p>For the list of security patches included in Sonoma 14.7.3, <a href=\"https:\/\/support.apple.com\/en-us\/122069\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Settings<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"ventura\"><\/a><\/p>\n<h3>macOS Ventura 13.7.3<\/h3>\n<p><strong>Available for: <\/strong>All supported Macs currently running macOS Ventura<\/p>\n<p><strong>Security fixes:<\/strong><br \/>\nIn this update, Apple addressed at least 31 vulnerabilities with CVEs assigned. Most of them are the same as those found in the Sequoia update.<\/p>\n<p>For the list of security patches included in Ventura 13.7.3, <a href=\"https:\/\/support.apple.com\/en-us\/122070\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Settings<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"saf\"><\/a><\/p>\n<h3>Safari 18.3 for macOS Ventura and Sonoma<\/h3>\n<p><strong>Available for: <\/strong>macOS Sonoma and macOS Ventura<\/p>\n<p>This update addresses at least seven issues with CVEs assigned, with no &#8220;additional recognitions&#8221; listed. You can read about these patches <a href=\"https:\/\/support.apple.com\/en-us\/122074\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>You can get this update via <strong>System Settings<\/strong> &gt;<strong> Software Update<\/strong> on your Mac.<a name=\"18\"><\/a><\/p>\n<h3>iOS 18.3 and iPadOS 18.3<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later<\/p>\n<p><strong>General update information and new features:<\/strong><\/p>\n<p>Visual intelligence with Camera Control (All iPhone 16 models):<br \/>\n\u2022 Add an event to Calendar from a poster or flyer<br \/>\n\u2022 Easily identify plants and animals<\/p>\n<p>Notification summaries (All iPhone 16 models, iPhone 15 Pro, iPhone 15 Pro Max):<br \/>\n\u2022 Easily manage settings for notification summaries from the Lock Screen<br \/>\n\u2022 Updated style for summarized notifications better distinguishes them from other notifications by using italicized text as well as the glyph<br \/>\n\u2022 Notification summaries for News &amp; Entertainment apps are temporarily unavailable, and users who opt-in will see them again when the feature becomes available<\/p>\n<p>Other enhancements and bug fixes:<br \/>\n\u2022 Calculator repeats the last mathematical operation when you tap the equals sign again<br \/>\n\u2022 Fixes an issue where the keyboard might disappear when initiating a typed Siri request<br \/>\n\u2022 Resolves an issue where audio playback continues until the song ends even after closing Apple Music<\/p>\n<h4><strong>Security fixes in iOS 18.3 and iPadOS 18.3<\/strong><\/h4>\n<p>In this update, Apple addressed at least 28 vulnerabilities with CVEs assigned. Most of them are the same as those found in the other OS updates. Notable fixes specific to iOS and iPadOS include:<\/p>\n<blockquote>\n<p class=\"gb-header\"><strong>Accessibility<\/strong><br \/>\nImpact: An attacker with physical access to an unlocked device may be able to access Photos while the app is locked<br \/>\nDescription: An authentication issue was addressed with improved state management.<br \/>\nCVE-2025-24141: Abhay Kailasia (@abhay_kailasia) from C-DAC Thiruvananthapuram India<\/p>\n<p>&nbsp;<\/p>\n<p class=\"gb-header\"><strong>Managed Configuration<\/strong><br \/>\nImpact: Restoring a maliciously crafted backup file may lead to modification of protected system files<br \/>\nDescription: This issue was addressed with improved handling of symlinks.<br \/>\nCVE-2025-24104: Hichem Maloufi, Hakim Boukhadra<\/p>\n<p>&nbsp;<\/p>\n<p class=\"gb-header\"><strong>Passkeys<\/strong><br \/>\nImpact: An app may gain unauthorized access to Bluetooth<br \/>\nDescription: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org.<br \/>\nCVE-2024-9956: mastersplinter<\/p>\n<\/blockquote>\n<p>The details of the security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/122066\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To get this latest update, connect your device to your Mac and follow the update prompts. You can also download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<a name=\"17\"><\/a><\/p>\n<h3>iPadOS 17.7.4<\/h3>\n<p><strong>Available for:\u00a0<\/strong>iPad Pro 12.9-inch 2nd generation, iPad Pro 10.5-inch, and iPad 6th generation<\/p>\n<p><strong>Security fixes and updates:<\/strong><\/p>\n<p>This update addresses 17 issues, most of them the same as those addressed in the iPadOS 18 update.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/122067\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To get your hands on this latest update, connect your device to your Mac and follow the update prompts. You can also download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<\/p>\n<p>Interestingly, Apple did not release an update for iOS 17, and has not since November 2024; Apple also skipped iOS 17 in December when the company released iPadOS 17.7.3. It is likely that iOS 17 won&#8217;t see any more security updates going forward. This is a logical move, as all iPhones that can run iOS 17 are capable of running iOS 18; meanwhile, Apple cut off some iPads from iPadOS 18.<a name=\"wat\"><\/a><\/p>\n<h3>watchOS 11.3<\/h3>\n<p><strong>Available for: <\/strong>Apple Watch Series 6 and later<\/p>\n<p><strong>Security-related fixes and updates:<br \/>\n<\/strong>Apple addressed at least 17 vulnerabilities with CVEs in this update, mostly the same as in the other OS updates.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/122071\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To install this update, make sure your iPhone is up to date first, both your phone and watch are connected to the same Wi-Fi network, and the watch has at least a 50% charge. Then open the Watch app on your phone and tap <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"tv\"><\/a><\/p>\n<h3>tvOS 18.3<\/h3>\n<p><strong>Available for: <\/strong>Apple TV HD and Apple TV 4K (all models)<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nApple addressed at least 17 vulnerabilities with CVEs in this update, mostly the same as in the other OS updates.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/122072\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To install this update, go to <strong>Settings &gt; System &gt; Software Updates<\/strong> on your Apple TV.<a name=\"visionos\"><\/a><\/p>\n<h3>visionOS 2.3<\/h3>\n<p><strong>Available for:<\/strong> Apple Vision Pro<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nApple addressed at least 20 vulnerabilities with CVEs in this update, mostly the same as in the other OS updates.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/122073\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To install this update, go to <strong>Settings &gt; General &gt; Software Update<\/strong><a name=\"notpatched\"><\/a><\/p>\n<h3>What Apple didn&#8217;t patch<\/h3>\n<p>Though some of the following shouldn&#8217;t come as a big surprise, Apple did not release security updates for any of the following operating systems this month:<\/p>\n<ul>\n<li><strong>iOS 17<\/strong> \u2014 no updates since November 2024<\/li>\n<li><strong>iOS 15 and iPadOS 15<\/strong> \u2014 no security updates since January 2024<\/li>\n<li><strong>iOS 12<\/strong> \u2014 no updates since January 2023<\/li>\n<li><strong>watchOS 10<\/strong> \u2014 no security updates since July 2024<\/li>\n<li><strong>watchOS 8<\/strong> \u2014 no updates since June 2023<\/li>\n<\/ul>\n<p>With the exception of iOS 17, each of these operating systems was a cutoff point for some hardware; some devices are stuck with these OS versions and cannot be upgraded to the current ones. However, all devices currently running iOS 17 are capable of running iOS 18; owners should install the free upgrade.<\/p>\n<p>If you have an older device that cannot be upgraded to the latest version of iOS or iPadOS (18.x) or watchOS (11.x), you should strongly consider purchasing a newer model. The latest models of iPhone, iPad, and Apple Watch can run the newest operating systems, and can thus get all available security updates.<a name=\"howinstall\"><\/a><\/p>\n<h3>How to install Apple security updates<\/h3>\n<h4><strong>For macOS updates<\/strong><\/h4>\n<p><strong>If you haven&#8217;t yet upgraded to macOS Sequoia<\/strong>, be sure to first update your critical software. For example, run Intego&#8217;s NetUpdate utility and install all available updates, and then check for updates for all other software that you use regularly. Next, check for macOS updates by going to System Settings &gt; General &gt; Software Update.<\/p>\n<p>If you have any trouble getting the macOS update to show up, either press \u2318R at the Software Update screen, or type in the Terminal <code>softwareupdate -l<\/code> (that\u2019s a lowercase L) and press Return\/Enter, then check System Settings &gt; General &gt; Software Update again.<\/p>\n<p>Note that <strong>only the latest macOS version (currently, that&#8217;s macOS Sequoia) is ever fully patched<\/strong>; older macOS versions only get a subset of those patches and remain vulnerable. Therefore, staying on the latest macOS version is critically important for maintaining your security and privacy. For more information, see our article, &#8220;<a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-does-an-old-mac-become-unsafe-to-use\/\">When does an old Mac become unsafe to use?<\/a>&#8221;<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>For other Apple OS updates<\/strong><\/h4>\n<p>Users of <strong>iPhone or iPad<\/strong> can open the Settings app and choose General &gt; Software Update to update iOS or iPadOS on their devices. (This is called an &#8220;over the air&#8221; or OTA update.) Alternatively, you can connect your device to your Mac, click on the device name in a Finder window sidebar, and check for updates there; or, if you use a Windows PC, you can use the <a href=\"https:\/\/apps.microsoft.com\/detail\/9np83lwlpz9k?hl=en-us&amp;gl=US\" target=\"_blank\" rel=\"noopener\">Apple Devices app<\/a>.<\/p>\n<p>To update <strong>watchOS on your Apple Watch<\/strong>, the process is a bit more complicated. First, update your iPhone to the latest iOS version. Next, ensure that both your iPhone and Apple Watch are on the same Wi-Fi network. Your Apple Watch also needs to have at least a 50% charge. Then open the Watch app on your iPhone and tap General &gt; Software Update.<\/p>\n<p>To update <strong>tvOS on your Apple TV<\/strong>, open the Settings app and choose System &gt; Software Updates.<\/p>\n<p>Although Apple doesn&#8217;t list <strong>HomePod Software<\/strong> on its security updates page, its operating system (sometimes called audioOS) gets updates, too; the <a href=\"https:\/\/mrmacintosh.com\/macos-sequoia-15-3-update-everything-you-need-to-know\/#:~:text=audioOS\" target=\"_blank\" rel=\"noopener\">OS build numbers<\/a> are identical to tvOS, and presumably include the same updates. Your HomePod should update automatically. However, if you would like to update your HomePod or HomePod mini&#8217;s operating system manually, you can go into the <strong>Home<\/strong> app on your iPhone or iPad, then tap the\u00a0<strong>House icon<\/strong> &gt; <strong>Home Settings<\/strong> &gt;<strong> Software Update<\/strong> &gt; temporarily disable (toggle off) <strong>Install Updates Automatically<\/strong> &gt; then tap <strong>Install<\/strong>. After updating, remember to <strong>re-enable the Install Updates Automatically<\/strong> setting.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>It&#8217;s wise to back up before updating<\/strong><\/h4>\n<p>Whenever you&#8217;re preparing to update macOS, iOS, or iPadOS, it&#8217;s a good idea to always <strong>back up your data<\/strong> before installing any updates. This gives you a restore point if something does not go as planned. See our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">how to check your macOS backups to ensure they work correctly<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"AoeYMSJo0j\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=AoeYMSJo0j\" data-secret=\"AoeYMSJo0j\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>See also our article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">how to back up your iPhone or iPad to iCloud and to your Mac<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"2Ssa2HqB2L\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/embed\/#?secret=2Ssa2HqB2L\" data-secret=\"2Ssa2HqB2L\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple released critically urgent security updates this week for macOS, iOS, iPadOS, visionOS, and tvOS to address a bug that was actively exploited in the wild.<\/p>\n","protected":false},"author":79,"featured_media":99268,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[69,4741,4564,4685,4742,3175,4740,4686,4643,201],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple released critically urgent security updates this week for macOS, iOS, iPadOS, visionOS, and tvOS to address a bug that was actively exploited in the wild.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iOS 18.3 and macOS Sequoia 15.3 patch first Apple zero-day of 2025 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple released critically urgent security updates this week for macOS, iOS, iPadOS, visionOS, and tvOS to address a bug that was actively exploited in the wild.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-28T07:59:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-11T06:47:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple software update red critical urgent actively exploited zero-day vulnerability with subtle this is fine meme dog fire background\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/\",\"name\":\"iOS 18.3 and macOS Sequoia 15.3 patch first Apple zero-day of 2025 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#primaryimage\"},\"datePublished\":\"2025-01-28T07:59:49+00:00\",\"dateModified\":\"2025-02-11T06:47:25+00:00\",\"description\":\"Apple released critically urgent security updates this week for macOS, iOS, iPadOS, visionOS, and tvOS to address a bug that was actively exploited in the wild.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iOS 18.3 and macOS Sequoia 15.3 patch first Apple zero-day of 2025\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"iOS 18.3 and macOS Sequoia 15.3 patch first Apple zero-day of 2025\",\"datePublished\":\"2025-01-28T07:59:49+00:00\",\"dateModified\":\"2025-02-11T06:47:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#webpage\"},\"wordCount\":2507,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg\",\"keywords\":[\"iOS\",\"iOS 18\",\"iPadOS\",\"iPadOS 17\",\"iPadOS 18\",\"macOS\",\"macOS Sequoia\",\"macOS Sonoma\",\"macOS Ventura\",\"Security Updates\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple released critically urgent security updates this week for macOS, iOS, iPadOS, visionOS, and tvOS to address a bug that was actively exploited in the wild.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/","og_locale":"en_US","og_type":"article","og_title":"iOS 18.3 and macOS Sequoia 15.3 patch first Apple zero-day of 2025 - The Mac Security Blog","og_description":"Apple released critically urgent security updates this week for macOS, iOS, iPadOS, visionOS, and tvOS to address a bug that was actively exploited in the wild.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/","og_site_name":"The Mac Security Blog","article_published_time":"2025-01-28T07:59:49+00:00","article_modified_time":"2025-02-11T06:47:25+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","width":400,"height":260,"caption":"Apple software update red critical urgent actively exploited zero-day vulnerability with subtle this is fine meme dog fire background"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/","name":"iOS 18.3 and macOS Sequoia 15.3 patch first Apple zero-day of 2025 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#primaryimage"},"datePublished":"2025-01-28T07:59:49+00:00","dateModified":"2025-02-11T06:47:25+00:00","description":"Apple released critically urgent security updates this week for macOS, iOS, iPadOS, visionOS, and tvOS to address a bug that was actively exploited in the wild.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"iOS 18.3 and macOS Sequoia 15.3 patch first Apple zero-day of 2025"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"iOS 18.3 and macOS Sequoia 15.3 patch first Apple zero-day of 2025","datePublished":"2025-01-28T07:59:49+00:00","dateModified":"2025-02-11T06:47:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#webpage"},"wordCount":2507,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","keywords":["iOS","iOS 18","iPadOS","iPadOS 17","iPadOS 18","macOS","macOS Sequoia","macOS Sonoma","macOS Ventura","Security Updates"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qMK","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102966"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=102966"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102966\/revisions"}],"predecessor-version":[{"id":103028,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102966\/revisions\/103028"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/99268"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=102966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=102966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=102966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}