Apple Issues Emergency Updates for Exploited Zero-Day Affecting iOS, macOS and All Major Devices


Apple has released urgent security updates across iOS, iPadOS, macOS, tvOS, watchOS, and visionOS to fix a zero-day vulnerability that was actively exploited in the wild against targeted users. The flaw could allow attackers to run arbitrary code on vulnerable devices without user consent.

The vulnerability is tracked as CVE-2026-20700, a memory corruption issue in dyld, Apple’s Dynamic Link Editor the component responsible for loading shared code libraries. According to Apple’s own security advisories, the flaw was discovered and reported by Google’s Threat Analysis Group (TAG) and has been linked to sophisticated, targeted attacks on versions of iOS before iOS 26.

“An attacker with memory write capability may be able to execute arbitrary code,” Apple said in official security notes on CVE-2026-20700. “Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26.”

Apple does not always disclose details on active exploitation. The company confirmed that this flaw was part of a wider chain including previous zero-days fixed in December 2025, indicating attackers have been combining multiple vulnerabilities to compromise devices.

What Devices and Systems Are Affected?

Apple has patched CVE-2026-20700 and dozens of other vulnerabilities in the following updates:

Operating SystemDevices Covered
iOS 26.3 & iPadOS 26.3iPhone 11 and newer, modern iPads
macOS Tahoe 26.3All supported Macs
tvOS 26.3Apple TV HD & Apple TV 4K
watchOS 26.3Apple Watch Series 6 and newer
visionOS 26.3Apple Vision Pro

Older releases of iOS, macOS, iPadOS, and Safari have also received updates to address legacy CVEs and other security issues.

Technical Impact of the Exploited Zero-Day

CVE-2026-20700 is a memory corruption bug in dyld. If an attacker has the ability to write to memory, they can gain control of execution flow and run arbitrary code. This broad class of bug can be leveraged for spyware deployment, silent remote control, or other malicious objectives.

In Apple’s security content descriptions, the fix was implemented through improved state management, effectively closing the window attackers used to corrupt memory.

This vulnerability is linked to a group of earlier bugs patched in late 2025, including memory and use-after-free issues in WebKit and other components that attackers were seen chaining together in highly targeted attacks.

Why This Matters Now

Zero-day vulnerabilities are rare but critically important when actively exploited. The involvement of Google TAG in discovering this issue highlights the seriousness of the risk. These updates likely mitigated real attacks that had already begun against specific individuals long before Apple publicly disclosed the flaw.

Security leaders and administrators should treat this as an urgent priority for all Apple infrastructure. Failure to apply these patches can leave devices open to remote compromise, data theft, or persistent spyware installation.

Additional Patches Released

Alongside CVE-2026-20700, Apple’s updates address many other security weaknesses affecting:

  • CoreServices and kernel logic issues that could allow privilege escalation.
  • WebKit memory handling and crash flaws impacting Safari and web content.
  • App sandbox and authorization bypass errors that could lead to data leakage or unintended escalation.

These additional fixes improve overall platform security and reduce risk from other exploited and theoretical threats.

Steps Users and Organizations Should Take

Security professionals and Apple users are advised to:

  • Install iOS 26.3 or later immediately on all compatible iPhones and iPads.
  • Apply macOS Tahoe 26.3 on Macs used for business or sensitive work.
  • Update tvOS, watchOS, and visionOS devices where applicable.
  • Audit Apple devices in enterprise fleets to confirm update compliance.
  • Review organizational MDM policies to enforce timely patch rollout.

Because the exploited zero-day was targeted and sophisticated, delaying updates could leave sensitive users at risk of persistent compromise.

FAQ: Apple’s 2026 Zero-Day Update

Q: What is a zero-day vulnerability?

A zero-day is a flaw that attackers can exploit before developers have released a patch. CVE-2026-20700 was being used by attackers before Apple’s fix was released.

Q: Which Apple component did the zero-day affect?

It affected dyld (Dynamic Link Editor), a core system component that loads shared libraries on Apple devices.

Q: Who found the zero-day?

Google’s Threat Analysis Group (TAG) is credited with reporting the issue to Apple.

Q: What versions should users update to?

Users should update to iOS 26.3, iPadOS 26.3, macOS Tahoe 26.3, tvOS 26.3, watchOS 26.3, and visionOS 26.3.

Q: Is this Apple’s first actively exploited zero-day in 2026?

Yes, this is the first such confirmed exploited vulnerability patched this year, following nine zero-days fixed in 2025.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages