Apple, Google forced to issue emergency 0-day patches
- Reference: 1765796471
- News link: https://www.theregister.co.uk/2025/12/15/apple_follows_google_by_emergency/
- Source link:
Over the past few days, the two tech giants have rushed updates out the door to close vulnerabilities that attackers were already abusing against an unspecified number of targets, once again forcing users to patch first and ask questions later.
Apple pushed fresh security updates across much of its ecosystem, including iPhones, iPads, and Macs, fixing a pair of bugs in WebKit that it says may have been abused in an "extremely sophisticated attack against specific targeted individuals." As usual, Cupertino was light on technical detail, offering little more than a warning that the exploits were real and already in circulation.
[1]
Google, meanwhile, shipped a Chrome Stable channel update addressing multiple security flaws, including at least one zero-day that had already been exploited before a fix was available. The high-risk bug, tracked as CVE-2025-14174, was described as an out-of-bounds memory access vulnerability, with Google acknowledging it was aware of an exploit in the wild.
[2]700+ self-hosted Gits battered in 0-day attacks with no fix imminent
[3]Cloudflare blames Friday outage on borked fix for React2shell vuln
[4]Two Android 0-day bugs disclosed and fixed, plus 105 more to patch
[5]Google Chrome bug exploited as a 0-day – patch now or risk full system compromise
Google [6]quietly fixed the Chrome bug last Wednesday , but said the vulnerability was still "under coordination." The Chocolate Factory updated its patch notes after Apple disclosed its own findings, revealing the overlap between the two companies' investigations.
Neither company has spilled many technical details, but Google credits the discovery of CVE-2025-14174 to Apple's security engineering team and Google's Threat Analysis Group – a unit better known for tracking mercenary spyware vendors and state-backed intrusion campaigns than for chasing everyday malware. That attribution strongly hints this was spyware-grade exploitation rather than opportunistic drive-by hacking.
[7]
The flurry of fixes adds to a growing zero-day tally for both firms. With these latest updates, Apple has now patched nine vulnerabilities exploited in the wild so far in 2025, while Google has been forced to tackle eight Chrome zero-days this year, a pace that suggests attackers continue to prize browsers and mobile platforms as some of the most lucrative real estate around. ®
Get our [8]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aUA-s6jWe42KKeGUy_9_QAAAAYA&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://www.theregister.com/2025/12/10/gogs_0day_under_active_exploitation/
[3] https://www.theregister.com/2025/12/05/react2shell_pocs_exploitation/
[4] https://www.theregister.com/2025/12/02/android_0_days/
[5] https://www.theregister.com/2025/11/18/google_chrome_seventh_0_day/
[6] https://www.theregister.com/2025/12/11/google_fixes_supersecret_8th_chrome/
[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aUA-s6jWe42KKeGUy_9_QAAAAYA&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[8] https://whitepapers.theregister.com/
The problem with Microsoft is the increasing "surface area" that is exposed through pretty much inherent flaws in the server components, because of their monolithic design. Drive-by attacks on browsers are bad enough, but they usually require some kind of action by the user, less so when Exchange is compromised.
And just for balance...
https://www.linuxcompatible.org/story/linux-security-roundup-for-week-50-2025/
I don't have a running total, but I've never seen an "empty" page--there is always something to fix.
Sure, I expect to get downvoted into next year, but you know what? To me, the downvotes are worth what they cost.
Thanky for the reminder
You could have just written: Time to update your MacOS if you haven't yet ;)
Thanks for the reminder, anyway!
Re: Thanky for the reminder
Personally, I'd prefer more frequent security updates that are smaller and easier to install.
Re: Thanky for the reminder
What exactly is hard about updates for iOS and MacOS when it comes to applying the updates?
At least and in my experience, I've never had an update forced on me. I've always been able to delay them until it was convenient for me to apply them. I only updated to MacOS 26.1 last week.
YMMV naturally but I'd like to know what is hard.
Re: Thanky for the reminder
i'd rather security updates that are separate to feature updates but thats not possible in the apple ecosystem unless you stick with the previous OS.
Upgrade to the current train & features are drip fed throughout the year.
stick to last years OS and get the back fixes.
seems obvious, but i suspect many just upgrade and either don't notice the missing features they thought they where getting but didn't, example being an improved Siri which we are still awaiting but i struggle to comprehend why i need a firmware update to get an improved cloud offering & yes i appreciate lots of Siri is device processed but its still reliant on that cloud fallback.
Just out of interest, how many issues has Microsoft patched in 2025?
They've had some rather "exciting" Patch Tuesdays if I recall correctly. Everybody needs to aggressively stay on top of all of this, irrespective of platform.
The React issue, for instance, is apparently still very much floating around :(.