Attacks exploiting a recently addressed Apple iOS authentication bypass issue, tracked as CVE-2025-24200, could circumvent USB lockouts implemented by Apple after a period of inactivity, SC Media reports.
Quarkslab researchers said the vulnerability, which was discovered by Citizen Lab and fixed in iOS 18.3.1, stems from interactions between the iOS Assistive Touch feature and USB connections, which enables a custom script to display an alert disabling numerous data connection restrictions. Deactivation or bypassing of the security protocols would then allow data exfiltration even when the compromised device remains unlocked, the Quarkslab researchers noted.
"While the device is in restricted mode, the USB protocol is completely disabled," said the researchers. "However, other protocols can be used freely over the lightning port. This is for instance the case of the iAP2 protocol that can be used by MFi devices."
The Quarkslab researchers encourage security teams to apply the iOS 18.3.1 patch.