Skip to main content
Mallory
Mallory

Apple iOS/iPadOS Security Updates and CVE Fixes Across Multiple Releases

security updatesapplepasscode bypass timing issuesvulnerabilityface idios
Updated January 26, 2026 at 11:01 PM10 sources
Apple iOS/iPadOS Security Updates and CVE Fixes Across Multiple Releases

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Apple published security advisories detailing vulnerability fixes across multiple iOS and iPadOS versions, including iOS/iPadOS 16.7, 17.2, 18.1, 18.3, 26.1, and 26.2. The advisories describe a range of impacts such as sandbox escapes (including Web Content sandbox breakout), privacy issues where apps could access or expose sensitive user data via insufficient log redaction, file-system modification via temporary-file handling, and memory-safety flaws (e.g., out-of-bounds reads, type confusion, and bounds-checking issues) that could lead to crashes or memory corruption. Apple attributes fixes to changes like improved protocol handling, cache handling, input validation, and additional permission restrictions, and references issues by CVE where available.

Several advisories also highlight device-state and authentication/logic weaknesses: iOS/iPadOS 18.3 includes a case where an attacker with physical access to an unlocked device could access Photos while the app is locked (CVE-2025-24141), while iOS/iPadOS 18.1 includes a lock-screen exposure issue (CVE-2024-44274) and a Shortcuts-related path-handling flaw that could allow arbitrary shortcut execution without user consent (CVE-2024-44255). The iOS/iPadOS 26.x advisories include privacy and permission issues (e.g., identifying installed apps, screenshots of sensitive embedded views), potential kernel memory corruption/system termination conditions, and logic/UI issues affecting security posture (e.g., passcode requirement timing after Face ID enrollment restore scenarios and potential FaceTime caller ID spoofing), with multiple findings credited to external researchers and teams (including Google Project Zero, ByteDance IES Red Team, and others).

Related Entities

Vulnerabilities

Heap-based buffer overflow in OpenEXR (deep scanline parsing) (CVE-2023-5841)Sensitive information exposure via system logging redaction issue in Apple OSes (CVE-2025-43423)Sensitive Data Exposure via Logging in Contacts (iOS/iPadOS 26.0) (CVE-2025-43426)Sensitive data exposure via environment variable handling in Apple MallocStackLogging (CVE-2025-43294)Apple Photos temporary file handling privacy issue (CVE-2025-43391) (CVE-2025-43391)Sensitive data access in Apple Notes (macOS/iOS/iPadOS/visionOS) (CVE-2025-43389)CVE-2025-43500Symlink validation flaw allowing protected user data access in AppleMobileFileIntegrity (CVE-2025-43379)Sensitive data access via authorization/state management issue in Apple FileProvider (CVE-2025-43498)Privacy preferences bypass in Apple OSes/Safari (CVE-2025-43502) (CVE-2025-43502)Lock screen restricted content disclosure in iOS/iPadOS (CVE-2025-43350) (CVE-2025-43350)User fingerprinting via permissions issue in Apple Installer (CVE-2025-43444)User fingerprinting via Find My (Apple platforms) (CVE-2025-43507)User fingerprinting via privacy controls bypass in iOS/iPadOS (CVE-2025-43437)User fingerprinting via sensitive data exposure in iOS/iPadOS/visionOS (CVE-2025-43439)Lock-screen information disclosure via Spotlight in iOS/iPadOS (CVE-2025-43418)Sandbox escape in Apple Assets (entitlement issue) (CVE-2025-43407)Sandbox escape via symlink validation flaw in Apple CloudKit (CVE-2025-43448)Kernel memory corruption / system termination via memory-handling issue in Apple OSes (CVE-2025-43447)Kernel memory corruption in Apple Neural Engine (Apple OSes) (CVE-2025-43462)Siri lock-screen data exposure in iOS/iPadOS (CVE-2024-40840) (CVE-2024-40840)Installed-app enumeration via CoreServices permissions issue (Apple OSes) (CVE-2025-43436)Screenshot Capture of Sensitive Data in Embedded Views (Apple iOS/iPadOS/watchOS/visionOS) (CVE-2025-43455)Installed-app enumeration via permissions issue in iOS/iPadOS (CVE-2025-43442)Use-after-free in WebKit (CVE-2025-43440) leading to process/Safari crash (CVE-2025-43440)Memory corruption in Apple Kernel (CVE-2025-43398) leading to unexpected system termination (CVE-2025-43398)iOS/iPadOS lock screen contacts disclosure (CVE-2024-44180) (CVE-2024-44180)CVE-2025-43422iOS/iPadOS camera privacy bypass via logic issue (pre-permission camera view inference) (CVE-2025-43450)Safari/WebKit use-after-free leading to Safari crash (CVE-2025-43457)System-wide network connection observation by sandboxed app in Apple OSes (libxpc sandbox restriction bypass) (CVE-2025-43413)User Tracking via Apple TV Remote in iOS/iPadOS (CVE-2025-43449)Lock Screen bypass in macOS Sidecar (state management issue) (CVE-2024-44145)

Organizations

Affected Products

Sources

5 more from sources like apple support and zdnet zero day

Related Stories

Apple security updates addressing actively exploited iOS and macOS vulnerabilities

Apple security updates addressing actively exploited iOS and macOS vulnerabilities

Apple published multiple security advisories across iOS/iPadOS, macOS, and watchOS releases that include fixes for vulnerabilities reported as **actively exploited** in the wild. Notable exploited issues include iOS/iPadOS 15.6.1 fixes for **kernel** and **WebKit** out-of-bounds writes enabling arbitrary code execution (`CVE-2022-32894`, `CVE-2022-32893`), iOS/iPadOS 16.3.1’s exploited **WebKit** type confusion leading to code execution (`CVE-2023-23529`), and iOS/iPadOS 15.7.5 plus macOS Big Sur 11.7.6 addressing an **IOSurfaceAccelerator** out-of-bounds write that could yield kernel-level code execution (`CVE-2023-28206`) alongside an exploited **WebKit** use-after-free (`CVE-2023-28205`). Apple also shipped iOS/iPadOS 16.6.1 and macOS Ventura 13.5.2 updates to remediate an exploited **ImageIO** buffer overflow (`CVE-2023-41064`) and an exploited **Wallet** attachment validation issue that could allow code execution (`CVE-2023-41061`). Separately, Apple’s iOS 17.0.1 and watchOS 9.6.3 advisories describe two vulnerabilities (`CVE-2023-41991`, `CVE-2023-41992`) reported by **Citizen Lab** and Google’s **Threat Analysis Group** as exploited against versions prior to iOS 16.7, involving **signature validation bypass** and **local privilege escalation**. Other referenced advisories (e.g., iOS/iPadOS 16.7, iOS/iPadOS 17.2, iOS/iPadOS 18.1, iOS/iPadOS 18.3, macOS Sequoia 15.1, iOS/iPadOS 26.1, macOS Tahoe 26.1, iOS/iPadOS 26.2) primarily enumerate additional CVEs and privacy/logic/memory-safety fixes but do not clearly tie to the same specific exploited-vulnerability disclosures, indicating they are broader platform security bulletins rather than part of a single incident response.

1 months ago
Apple Security Updates Address Multiple Vulnerabilities Including an In-the-Wild Exploited Memory Corruption Flaw

Apple Security Updates Address Multiple Vulnerabilities Including an In-the-Wild Exploited Memory Corruption Flaw

Apple issued security updates across its ecosystem to address **multiple vulnerabilities** affecting *iOS, iPadOS, macOS, tvOS, watchOS,* and *visionOS*, with impacts including **remote code execution (RCE)**, denial of service, elevation of privilege, information disclosure, data manipulation, and security restriction bypass. HKCERT highlighted **CVE-2026-20700** as a **high-risk** issue and noted it is **being exploited in the wild**; the flaw is described as an **improper restriction of operations within the bounds of a memory buffer** that could allow arbitrary code execution when an attacker has memory-write capability. Apple’s iOS 26.3 and iPadOS 26.3 security content includes fixes for issues that could expose sensitive information on a locked device (e.g., **CVE-2026-20645** and **CVE-2026-20674**) and a Bluetooth-related denial-of-service condition where a privileged network attacker could trigger DoS using crafted packets (**CVE-2026-20650**). The updates apply to **iPhone 11 and later** and a range of supported iPad models, and Apple reiterated its policy of publishing details after patches are available.

1 months ago

Apple Releases iOS 26.1 and iPadOS 26.1 Security Updates Addressing Critical Vulnerabilities

Apple released iOS 26.1 and iPadOS 26.1, delivering critical security updates for a wide range of supported iPhone and iPad models. The updates address multiple vulnerabilities, including flaws in the Neural Engine that could allow malicious apps to crash system components or corrupt kernel memory, and weaknesses in Apple Account privacy controls that previously allowed unauthorized screenshot capture of sensitive data. Additional fixes strengthen sandbox enforcement and file integrity controls, reducing the risk of unauthorized data access or privilege escalation by malicious applications. Apple maintains its policy of withholding vulnerability details until patches are available, emphasizing the importance of timely updates for all eligible users. The company is also preparing for future releases, with iOS 26.2 expected to introduce new features such as digital passport support and RCS encryption, further enhancing both security and privacy for its user base.

4 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.