Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other Devices

Published: (February 12, 2026 at 12:39 AM EST)
2 min read

Source: The Hacker News

Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero‑day flaw that has been exploited in sophisticated cyber attacks.

Apple logo

Vulnerability Details

The vulnerability, tracked as CVE‑2026‑20700 (CVSS score: N/A), is a memory‑corruption issue in dyld, Apple’s Dynamic Link Editor. Successful exploitation allows an attacker with memory‑write capability to execute arbitrary code on vulnerable devices. The bug was discovered and reported by Google’s Threat Analysis Group (TAG).

“Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26,” the company said in its advisory. “CVE‑2025‑14174 and CVE‑2025‑43529 were also issued in response to this report.”

  • CVE‑2025‑14174 (CVSS 8.8) – out‑of‑bounds memory access in ANGLE’s Metal renderer component. Metal is Apple’s high‑performance graphics and compute API.
  • CVE‑2025‑43529 (CVSS 8.8) – use‑after‑free vulnerability in WebKit that can lead to arbitrary code execution when processing malicious web content.

ThreatLocker image

Affected Devices and OS Versions

  • iOS 26.3 and iPadOS 26.3 – iPhone 11 and later, iPad Pro 12.9‑inch 3rd gen and later, iPad Pro 11‑inch 1st gen and later, iPad Air 3rd gen and later, iPad 8th gen and later, iPad mini 5th gen and later
  • macOS Tahoe 26.3 – Macs running macOS Tahoe
  • tvOS 26.3 – Apple TV HD and Apple TV 4K (all models)
  • watchOS 26.3 – Apple Watch Series 6 and later
  • visionOS 26.3 – Apple Vision Pro (all models)

Additional Updates for Older Versions

References

  • Apple security update page:
  • CVE‑2026‑20700 details:
  • Google Threat Analysis Group announcement (linked in Apple advisory)
0 views
Back to Blog

Related posts

Read more »