BTCC / BTCC Square / Cryptopolitan /
Apple Rushes Emergency Security Patches After Zero-Day Exploit Targets Users in Active Cyber Attacks

Apple Rushes Emergency Security Patches After Zero-Day Exploit Targets Users in Active Cyber Attacks

Published:
2026-02-12 11:58:40
6
2

Apple rolls out emergency security updates to fix zero-day flaw targeted in cyber attacks

Apple scrambles to plug a critical security hole—already being weaponized by attackers—before more devices are compromised.

The Silent Breach

No fanfare, no grand announcement. Just a silent, urgent push of updates across iPhones, Macs, and iPads. The flaw? A zero-day vulnerability, meaning Apple's own security teams were in the dark until it was already being exploited in the wild. Attackers didn't wait for an invitation; they found the back door and walked right in.

What's at Stake?

While Apple keeps the technical specifics close to its chest—standard practice to prevent copycat attacks—the 'emergency' label says it all. These aren't routine bug fixes. This is damage control for a live threat, the digital equivalent of spotting smoke and calling the fire department before the whole block burns down. User data, device integrity, and that famous 'walled garden' security are all on the line.

The Update Mandate

The message is blunt: update now. The patches are live for supported devices. Delaying is a gamble with increasingly loaded dice. In the cybersecurity arms race, staying on an outdated version is like bringing a knife to a drone fight.

A Cynical Finance Footnote

Funny how 'urgent, critical security updates' are always free, yet the trillion-dollar tech giant still finds a way to monetize peace of mind elsewhere—looking at you, cloud storage subscriptions and 30% app store cuts. Security shouldn't be a luxury add-on.

Apple's reputation for ironclad security just took a hit. The patches are out, but the clock was already ticking. For users, it's a stark reminder: in today's digital ecosystem, even the most fortified gardens have weeds.

Zero-day flaw had already executed targeted attacks, Google report says

According to Apple’s patch notes, the zero-day bug was part of a set of vulnerabilities that had previously been identified and addressed. Two related flaws, CVE-2025-14174 and CVE-2025-43529, were fixed in late December.

At the time, Cryptopolitan reported that these earlier vulnerabilities were affecting WebKit, the engine that powers Apple’s Safari browser and all third-party browsers on iOS and iPadOS. 

The CVE-2025-14174 flaw involved an out-of-bounds memory access issue in ANGLE’s Metal renderer component. Metal is Apple’s hardware-accelerated graphics and compute framework.

On the other hand, CVE-2025-43529 hailed from a use-after-free vulnerability in WebKit. Cyber attackers could exploit the issue via specially crafted web content that enables code execution on a victim’s device.

One critical issue involved the CoreMedia framework, which handles audio and video processing. Hackers could take control of a user’s CoreMedia by sending maliciously crafted files to targeted iPhones. When processed, these files could trigger denial-of-service conditions or expose private data from the phone’s memory.

The vulnerabilities had likely been deployed in targeted spyware campaigns on activists, journalists, or government officials, Google’s analysis confirmed.

Apple notes lists devices eligible for updates

Apple’s latest security updates apply to both current and older devices, on multiple platforms. The company released iOS 26.3 and iPadOS 26.3 for iPhone 11 and later models, as well as several generations of iPads.

Mac computers running macOS Tahoe received version 26.3 updates, while Apple TV models gained tvOS 26.3. Apple Watch Series 6 and newer devices received watchOS 26.3.

Apple also issued visionOS 26.3 updates for all Vision Pro headsets, while older devices received patches through updates such as iOS 18.7.5, macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, and Safari 26.3.

Apple said the problem has been resolved through improved memory management in the latest iOS release.

Other patched vulnerabilities were made on Core system areas, including Game Center, ImageIO, the operating system kernel, and Apple’s Live Caption, Photos, Spotlight, Shortcuts, and StoreKit.

Siri feature upgrades delayed after failed tests

The security updates come as Apple struggles to upgrade its Siri voice assistant. The iPhone manufacturer was planning to launch Siri’s new features in the upcoming software release scheduled for March.

However, testing problems have forced Apple to reconsider the timeline, people familiar with the matter said. Some features are now expected to be delayed until later updates.

Apple initially planned to include the enhanced Siri capabilities in iOS 26.4. Although the update’s March release timeline has not changed, some functions will be excluded. Engineers are now testing the new features in iOS 26.5, expected to arrive in May, while more upgrades could be postponed further until iOS 27 in September.

During its first unveiling in June 2024, Siri was shown analyzing on-screen content and offering more precise voice control across both Apple and third-party applications. Apple had originally planned to deliver these features by early 2025, but that timeline was later pushed to an unspecified date in 2026.

Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

All articles reposted on this platform are sourced from public networks and are intended solely for the purpose of disseminating industry information. They do not represent any official stance of BTCC. All intellectual property rights belong to their original authors. If you believe any content infringes upon your rights or is suspected of copyright violation, please contact us at [email protected]. We will address the matter promptly and in accordance with applicable laws.BTCC makes no explicit or implied warranties regarding the accuracy, timeliness, or completeness of the republished information and assumes no direct or indirect liability for any consequences arising from reliance on such content. All materials are provided for industry research reference only and shall not be construed as investment, legal, or business advice. BTCC bears no legal responsibility for any actions taken based on the content provided herein.