Apple Issues Critical Security Updates for Zero-Day Vulnerability Across Devices

Apple Releases Critical Security Updates to Address Actively Exploited Zero-Day Vulnerability

On February 12, 2026, Apple issued a series of security updates across its product lineup, including iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS, to patch a zero-day vulnerability that has been actively exploited in sophisticated cyber attacks.

Understanding the Vulnerability

The identified flaw, designated as CVE-2026-20700, is a memory corruption issue within dyld, Apple’s Dynamic Link Editor. This vulnerability allows attackers with memory write capabilities to execute arbitrary code on affected devices. The discovery and reporting of this issue are credited to Google’s Threat Analysis Group (TAG).

Apple acknowledged the severity of the situation, stating, Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. This highlights the targeted nature of the attacks and the critical need for users to update their devices promptly.

Related Vulnerabilities and Previous Patches

In addition to CVE-2026-20700, Apple addressed two other vulnerabilities, CVE-2025-14174 and CVE-2025-43529, in December 2025. CVE-2025-14174 pertains to an out-of-bounds memory access in ANGLE’s Metal renderer component, a high-performance graphics and compute API developed by Apple. CVE-2025-43529 is a use-after-free vulnerability in WebKit that could lead to arbitrary code execution when processing maliciously crafted web content. Both vulnerabilities were also reported by Google’s TAG and have been exploited in the wild.

Devices and Systems Affected

The recent updates are available for a wide range of Apple devices and operating systems, including:

– iOS 26.3 and iPadOS 26.3: Compatible with iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later.

– macOS Tahoe 26.3: For Macs running macOS Tahoe.

– tvOS 26.3: Applicable to Apple TV HD and Apple TV 4K (all models).

– watchOS 26.3: For Apple Watch Series 6 and later.

– visionOS 26.3: Compatible with all models of Apple Vision Pro.

Additionally, Apple has released updates to address vulnerabilities in older versions of iOS, iPadOS, macOS, and Safari:

– iOS 18.7.5 and iPadOS 18.7.5: For iPhone XS, iPhone XS Max, iPhone XR, and iPad 7th generation.

– macOS Sequoia 15.7.4: For Macs running macOS Sequoia.

– macOS Sonoma 14.8.4: For Macs running macOS Sonoma.

– Safari 26.3: For Macs running macOS Sonoma and macOS Sequoia.

The Importance of Timely Updates

This marks Apple’s first actively exploited zero-day vulnerability addressed in 2026. In the previous year, the company patched nine zero-day vulnerabilities that were exploited in the wild. The prompt release of these updates underscores Apple’s commitment to user security and the importance of maintaining up-to-date software to protect against emerging threats.

Steps to Update Your Device

To ensure your device is protected, follow these steps to update:

1. For iOS and iPadOS Devices:

– Go to Settings > General > Software Update.

– If an update is available, tap Download and Install.

2. For macOS Devices:

– Click on the Apple menu in the top-left corner.

– Select System Preferences > Software Update.

– Click Update Now if an update is available.

3. For Apple Watch:

– Open the Watch app on your iPhone.

– Tap General > Software Update.

– If an update is available, tap Download and Install.

4. For Apple TV:

– Go to Settings > System > Software Updates.

– Select Update Software.

5. For Apple Vision Pro:

– Ensure your device is connected to Wi-Fi.

– Go to Settings > General > Software Update.

– If an update is available, follow the on-screen instructions to download and install.

Conclusion

The discovery and exploitation of CVE-2026-20700 highlight the ever-evolving landscape of cybersecurity threats. Apple’s swift response in releasing patches for this and related vulnerabilities demonstrates the company’s proactive approach to safeguarding its users. Users are strongly encouraged to update their devices immediately to mitigate potential risks associated with these vulnerabilities.