VulnerabilitiesHIGH

Mobile Vulnerabilities - Enterprises Struggle with Control

Featured image for Mobile Vulnerabilities - Enterprises Struggle with Control
SWSecurityWeek
CVE-2025-43300CVE-2025-24201CVE-2025-10585CVE-2025-48543CVE-2024-53104
🎯

Basically, mobile devices are becoming riskier as they have outdated software and hidden threats.

Quick Summary

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

What Happened

The mobile attack surface is expanding rapidly, leaving enterprises vulnerable. A recent report from Jamf highlights the critical security failings of mobile devices, revealing that many organizations lack control over their mobile environments. With the rise of Shadow AI in everyday apps and the prevalence of outdated operating systems, the risks are significant.

The State of Mobile Devices

Jamf's analysis of over 1.7 million mobile devices uncovered alarming statistics:

  • 53% of organizations had at least one device with a critically out-of-date operating system.
  • 18% of employees connected to risky hotspots.
  • 8% of devices clicked on phishing links, meaning that in a company of 100 employees, 8 could be at risk.

Moreover, 86% of 135 popular apps analyzed contained known security flaws, indicating that even widely used applications are not safe. The emergence of Shadow AI—unrecognized AI functionalities embedded in apps—further complicates the security landscape.

Adversarial Activity

Mobile devices are high-value targets for cybercriminals. Jamf's report identifies various spyware threats, including Predator and Pegasus, which have been used for both nation-state surveillance and financial gain. Zero-click attacks are particularly concerning, as they can exploit vulnerabilities without user interaction. For instance, CVE-2025-43300 and CVE-2025-24201 both have a severity score of 10.0, allowing attackers to exploit memory corruption in iOS devices simply by parsing images.

The Flaws

Several critical vulnerabilities were highlighted:

  • CVE-2025-10585 (9.8): Can lead to memory rewrites and crashes.
  • CVE-2025-48543 (8.8): Allows local escalation of privilege.
  • CVE-2024-53104 (7.8): Can cause memory corruption. These vulnerabilities underscore the urgent need for enterprises to address mobile security comprehensively.

What You Should Do

To mitigate these risks, enterprises must take proactive steps:

  • Inventory mobile devices: Understand what devices are in use and their configurations.
  • Implement regular updates: Ensure all devices receive timely operating system and app updates.
  • Educate employees: Raise awareness about phishing and safe device practices.

Lessons Learned

As the mobile attack surface continues to grow, enterprises must adapt their security strategies. The Jamf report illustrates that attackers are currently outpacing defenders. Organizations need to gain better control over their mobile estates to protect sensitive data effectively. Security is a moving target, and as new threats emerge, so must the defenses against them.

🔒 Pro insight: Analysis pending for this article.

Original article from

SWSecurityWeek· Kevin Townsend
Read Full Article

Related Pings

HIGHVulnerabilities

Cisco IMC Vulnerability - Critical Auth Bypass Flaw Discovered

A critical vulnerability in Cisco's IMC allows attackers to bypass authentication and change user passwords. This flaw poses a significant risk to various Cisco systems. Immediate patching is essential to secure these interfaces.

Help Net Security·
HIGHVulnerabilities

Supply Chain Vulnerabilities - Addressing Critical Oversight Gaps

Source code leaks are exposing critical vulnerabilities in software supply chains. This affects businesses and users alike, highlighting the urgent need for better security measures. Organizations must prioritize oversight to protect sensitive data.

Dark Reading·
HIGHVulnerabilities

TrueConf Zero-Day Exploited in Asian Government Attacks

A Chinese threat actor exploited a zero-day in TrueConf software, targeting government entities in Asia. This serious flaw poses risks to sensitive communications. Urgent patches are now required to secure systems.

SecurityWeek·
CRITICALVulnerabilities

Critical ShareFile Vulnerabilities Enable Unauthenticated RCE

Critical vulnerabilities in ShareFile could allow hackers to execute code without authentication. This puts sensitive data at risk for many organizations. Users must update their systems immediately to safeguard against these threats.

SecurityWeek·
HIGHVulnerabilities

TP-Link Vulnerabilities - Attackers Can Crash Routers

TP-Link's Tapo C520WS cameras have critical vulnerabilities that can lead to device crashes. Users must update their firmware immediately to avoid security risks and unauthorized access. Don't leave your surveillance equipment exposed!

Cyber Security News·
HIGHVulnerabilities

React2Shell Vulnerability - Hackers Compromise 700+ Hosts

Hackers have exploited the React2Shell vulnerability, compromising over 700 Next.js servers. This breach has led to significant data theft, impacting sensitive information. Organizations must act quickly to secure their applications and prevent further damage.

Cyber Security News·