• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

You are here: Home / General Cyber Security News / Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
February 12, 2026

Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks.

The vulnerability, tracked as CVE-2026-20700 (CVSS score: N/A), has been described as a memory corruption issue in dyld, Apple’s Dynamic Link Editor. Successful exploitation of the vulnerability could allow an attacker with memory write capability to execute arbitrary code on susceptible devices. Google Threat Analysis Group (TAG) has been credited with discovering and reporting the bug.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26,” the company said in an advisory. “CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.”

It’s worth noting that both CVE-2025-14174 and CVE-2025-43529 were addressed by Cupertino in December 2025, with the former first disclosed by Google as having been exploited in the wild. CVE-2025-14174 (CVSS score: 8.8) relates to an out-of-bounds memory access in ANGLE’s Metal renderer component. Metal is a high-performance hardware-accelerated graphics and compute API developed by Apple.

Cybersecurity

CVE-2025-43529 (CVSS score: 8.8), on the other hand, is a use-after-free vulnerability in WebKit that may lead to arbitrary code execution when processing maliciously crafted web content.

The updates are available for the following devices and operating systems –

  • iOS 26.3 and iPadOS 26.3 – iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later
  • macOS Tahoe 26.3 – Macs running macOS Tahoe
  • tvOS 26.3 – Apple TV HD and Apple TV 4K (all models)
  • watchOS 26.3 – Apple Watch Series 6 and later
  • visionOS 26.3 – Apple Vision Pro (all models)

In addition, Apple has also released updates to resolve various vulnerabilities in older versions of iOS, iPadOs, macOS, and Safari –

  • iOS 18.7.5 and iPadOS 18.7.5 – iPhone XS, iPhone XS Max, iPhone XR, iPad 7th generation
  • macOS Sequoia 15.7.4 – Macs running macOS Sequoia
  • macOS Sonoma 14.8.4 – Macs running macOS Sonoma
  • Safari 26.3 – Macs running macOS Sonoma and macOS Sequoia

With the latest development, Apple has moved to address its first actively exploited zero-day in 2026. Last year, the company patched nine zero-day vulnerabilities that were exploited in the wild.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «first malicious outlook add in found stealing 4,000+ microsoft credentials First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
  • First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
  • APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
  • Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
  • Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
  • Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
  • SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
  • DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
  • Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Copyright © TheCyberSecurity.News, All Rights Reserved.