Apple devices displaying security update notifications
Technology & Gadgets

Apple Rushes Out Critical Updates for Exploited Zero-Day Flaws Across Devices

Share
Share
Pinterest Hidden

Apple has moved swiftly to deploy critical security updates across its extensive ecosystem, addressing a zero-day vulnerability that has reportedly been exploited in highly sophisticated cyberattacks. The patches, released on Wednesday, target iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS, underscoring the urgency of the threat.

Urgent Fix for Memory Corruption Flaw

The primary vulnerability, identified as CVE-2026-20700, is described as a memory corruption issue residing within dyld

, Apple’s Dynamic Link Editor. This flaw, if successfully exploited, could grant an attacker with memory write capabilities the power to execute arbitrary code on vulnerable devices. Such an exploit could lead to complete system compromise, making immediate updates paramount for user safety.

Credit for discovering and reporting this critical bug goes to Google‘s renowned Threat Analysis Group (TAG), a team dedicated to tracking and countering state-sponsored and other advanced persistent threats. Apple’s advisory acknowledged the severity, stating, “Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26.”

Related Vulnerabilities and Their Impact

In conjunction with CVE-2026-20700, Apple’s advisory also referenced two other significant vulnerabilities: CVE-2025-14174 and CVE-2025-43529. While these were addressed in December 2025, their mention highlights a broader pattern of targeted attacks against Apple users.

CVE-2025-14174: Out-of-Bounds Memory Access

This vulnerability (CVSS score: 8.8) involves an out-of-bounds memory access within ANGLE’s Metal renderer component. Metal is Apple’s high-performance hardware-accelerated graphics and compute API, making this flaw particularly concerning as it could be leveraged through graphics-intensive applications or web content.

CVE-2025-43529: WebKit Use-After-Free

Also carrying a CVSS score of 8.8, CVE-2025-43529 is a use-after-free vulnerability found in WebKit, the browser engine powering Safari and all iOS browsers. This type of flaw is notoriously dangerous, as it can enable arbitrary code execution simply by processing maliciously crafted web content, posing a significant risk to users browsing the internet.

Affected Devices and Essential Updates

Apple urges all users to update their devices without delay to protect against these actively exploited vulnerabilities. The updates are available for a wide range of devices and operating systems:

  • iOS 26.3 and iPadOS 26.3: iPhone 11 and later, iPad Pro (3rd gen 12.9-inch and later, 1st gen 11-inch and later), iPad Air (3rd gen and later), iPad (8th gen and later), and iPad mini (5th gen and later).
  • macOS Tahoe 26.3: All Macs running macOS Tahoe.
  • tvOS 26.3: Apple TV HD and Apple TV 4K (all models).
  • watchOS 26.3: Apple Watch Series 6 and later.
  • visionOS 26.3:

    Apple Vision Pro (all models).

Furthermore, Apple has also released supplementary updates for older operating system versions to bolster their security:

  • iOS 18.7.5 and iPadOS 18.7.5: iPhone XS, iPhone XS Max, iPhone XR, iPad 7th generation.
  • macOS Sequoia 15.7.4: Macs running macOS Sequoia.
  • macOS Sonoma 14.8.4: Macs running macOS Sonoma.
  • Safari 26.3: Macs running macOS Sonoma and macOS Sequoia.

Apple’s Ongoing Battle Against Zero-Days

This latest round of patches marks Apple’s first actively exploited zero-day fix in 2026, signaling a continued cat-and-mouse game between security researchers, attackers, and tech giants. In 2025 alone, Apple addressed nine zero-day vulnerabilities that were found to be exploited in the wild, highlighting the persistent threat landscape and the critical importance of keeping devices updated.

Users are strongly advised to enable automatic updates or manually check for and install the latest software versions to safeguard their data and privacy against these sophisticated threats.


For more details, visit our website.

Source: Link

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *