Apple patches decade-old iOS zero-day exploited in the wild • The Register
#Vulnerabilities

Apple patches decade-old iOS zero-day exploited in the wild • The Register

Privacy Reporter
3 min read

Apple has patched a critical zero-day vulnerability in iOS that has existed since the first iPhone, used in sophisticated attacks against targeted individuals by commercial spyware developers.

Apple has issued an emergency security update for iOS, patching a critical zero-day vulnerability that has existed in every version of iOS since the original iPhone launched in 2007. The flaw, designated CVE-2026-20700, affects dyld - Apple's dynamic linker - and was discovered by Google's Threat Analysis Group.

A decade-old vulnerability finally closed

The vulnerability allows attackers with memory write capability to execute arbitrary code, potentially giving them complete control over affected devices. Apple confirmed the flaw was exploited in the wild and may have been part of an exploit chain targeting "specific targeted individuals."

Apple's advisory stated: "An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26."

Brian Milbier, deputy CISO at Huntress, provided a helpful analogy to understand the vulnerability's severity: "Think of dyld as the doorman for your phone. Every single app that wants to run must first pass through this doorman to be assembled and given permission to start. Usually, the doorman checks credentials and places apps in a high-security 'sandbox' where they can't touch your private data. This vulnerability allows an attacker to trick the doorman into handing over a master key before security checks even begin."

The commercial spyware connection

Security researchers believe this vulnerability was likely developed by commercial surveillance companies that sell spyware tools to government clients. These companies have previously created prominent spyware like Pegasus and Predator, which have been used for surveillance operations worldwide.

The sophistication of this attack is particularly concerning. By chaining the dyld vulnerability with WebKit flaws that Apple also addressed in the iOS 26.3 update, attackers created a "zero-click" or "one-click" path to total device control. Milbier explained: "They use a fake ID to bypass the front gate – your browser – and then exploit the doorman's flaw to take over the entire building."

Broader security implications

This discovery highlights several critical issues in the cybersecurity landscape:

  1. Long-lived vulnerabilities: A flaw that has existed for over a decade in the core iOS system demonstrates how deeply embedded security issues can persist undetected

  2. Commercial surveillance industry: Private companies developing and selling powerful surveillance tools to governments represent a growing threat to digital privacy

  3. Targeted attacks: The fact that this was used against "specific targeted individuals" rather than being a widespread attack suggests sophisticated threat actors are actively exploiting these vulnerabilities

  4. Zero-click exploits: The ability to compromise devices without user interaction represents one of the most dangerous forms of mobile malware

Other vulnerabilities addressed

While CVE-2026-20700 is the most critical flaw addressed in this update, Apple's iOS 26.3 and iPadOS 26.3 releases include fixes for numerous other security issues. These include vulnerabilities that could grant root access and disclose sensitive user information.

Google's Threat Analysis Group also referenced two other December vulnerabilities in their report, both carrying 8.8 CVSS scores. CVE-2025-14174 is an out-of-bounds memory access flaw in Google Chrome's ANGLE graphics engine on Mac, while CVE-2025-43529 is a use-after-free vulnerability leading to code execution.

What users should do

Given the severity and active exploitation of this vulnerability, Apple users should update their devices to iOS 26.3 or iPadOS 26.3 immediately. The update is available for all supported devices and represents one of the most critical security patches in recent iOS history.

The fact that a vulnerability has existed since the first iPhone underscores the importance of regular security updates and the ongoing arms race between tech companies and sophisticated threat actors. While Apple has now closed this particular door, the discovery serves as a reminder that even the most secure systems can harbor hidden vulnerabilities for years before being discovered and exploited.

Comments

Loading comments...