Apple Warns 1.8 Billion iPhone Users of “Extremely Sophisticated” Attack

Apple warns iPhone users

Apple has urged iPhone and iPad users to install the latest security updates after confirming two WebKit vulnerabilities were likely exploited in an “extremely sophisticated” attack against specific targeted individuals, with fixes shipped in iOS 26.2/iPadOS 26.2 (released Dec. 12, 2025).

What Apple disclosed

Apple said it is “aware of a report” that the issues “may have been exploited in an extremely sophisticated attack against specific targeted individuals” on iOS versions before iOS 26.
The vulnerabilities sit in WebKit, the browser engine that powers Safari and, on iPhone and iPad, underpins all browsers due to platform rules—meaning a malicious webpage can be enough to trigger risky behavior if the device is unpatched.

The vulnerabilities (what’s patched)

Apple’s security notes for iOS 26.2/iPadOS 26.2 describe two WebKit flaws tied to this warning: CVE-2025-43529 and CVE-2025-14174.
For CVE-2025-43529, Apple warns that processing maliciously crafted web content “may lead to arbitrary code execution,” and notes it was addressed via improved memory management.
For CVE-2025-14174, Apple warns that processing maliciously crafted web content “may lead to memory corruption,” and says it was addressed with improved validation.

Key vulnerability details

CVE Component Apple’s stated impact Apple’s mitigation Credit (as listed by Apple)
CVE-2025-43529 WebKit Malicious web content may lead to arbitrary code execution; may have been exploited in targeted attacks Improved memory management Google Threat Analysis Group (TAG)
CVE-2025-14174 WebKit Malicious web content may lead to memory corruption; may have been exploited in targeted attacks Improved validation Apple and Google Threat Analysis Group (TAG)

Who is affected (and where the fixes are)

Apple shipped the targeted-attack fixes in iOS 26.2 and iPadOS 26.2, available for iPhone 11 and later and a broad range of iPads (including iPad mini 5 and later).
Apple also included the same WebKit fixes in macOS Tahoe 26.2, indicating cross-device exposure where Safari/WebKit are used.

Patch map across Apple platforms

Platform Update containing the WebKit fixes Release date (Apple) Notes
iPhone / iPad iOS 26.2 / iPadOS 26.2 Dec. 12, 2025 Apple ties both CVEs to the “extremely sophisticated” targeted-attack report.
Mac macOS Tahoe 26.2 Dec. 12, 2025 Apple lists the same two WebKit CVEs and the same targeted-attack language.
Mixed environments (tracking/defense) KEV/industry tracking for CVE-2025-43529 Ongoing Threat intelligence listings note CVE-2025-43529 is tracked as actively exploited and appears on CISA’s KEV list. ​

Why this warning matters (the “how” of real-world exploitation)

WebKit bugs are high-value because they can be triggered through web content, which attackers can deliver via links in messages, emails, malvertising, or compromised websites.
Apple’s wording—“specific targeted individuals”—signals the reported exploitation was not described as broad, opportunistic malware, but as selective targeting (without naming victims or attributing an actor).
Separately, threat intelligence tracking notes CVE-2025-43529 is considered actively exploited and is listed by CISA in its Known Exploited Vulnerabilities catalog, which organizations often treat as a high-priority patch signal.​

What users should do now

Apple’s core guidance is to update promptly to the latest software versions that include the security fixes.
On iPhone and iPad, install iOS 26.2/iPadOS 26.2 via Settings → General → Software Update (or the equivalent enterprise-managed update flow).
On Mac, update to macOS Tahoe 26.2 via System Settings → General → Software Update, since Apple includes the same WebKit fixes there as well.

Practical safety checklist (non-speculative)

  • Turn on automatic updates where feasible so security patches land faster.
  • Treat unexpected links as risky even if they appear to come from known contacts, since web-delivered exploits can start with a single tap.
  • If an organization manages Apple devices, prioritize remediation of actively exploited WebKit CVEs tracked in the wider vulnerability ecosystem.​

Final thoughts

Apple’s latest warning centers on two WebKit vulnerabilities that it says were likely used in an “extremely sophisticated” attack against specific targets, with fixes delivered in iOS 26.2/iPadOS 26.2 and macOS Tahoe 26.2.

The immediate takeaway is operational rather than theoretical: applying the updates is the only reliable way to close the known exploited paths described in Apple’s advisories.
For security teams, the fact that CVE-2025-43529 is tracked as actively exploited and appears in CISA-oriented vulnerability prioritization signals a “patch fast” workflow for exposed fleets.​


Subscribe to Our Newsletter

Related Articles

Top Trending

On This Day March 30
On This Day March 30: History, Famous Birthdays, Deaths & Global Events
Capital gains tax Canada
17 Key Facts About Capital Gains Tax in Canada
AI Bias
The Rise of AI Bias: Why It Matters To Everyday Consumers
The Basics of Inventory Management for Growing Businesses
Streamline Profits with The Basics Of Inventory Management for Growing Businesses
Critical Minerals Developing Nations
The Minerals That Could Change Everything — If the Developing World Acts Now

Fintech & Finance

Ai In Financial Services
How AI Is Making Financial Services More Accessible: Unlocking Opportunities
crypto remittances New Zealand
17 Critical Facts About How New Zealanders Are Using Crypto for International Remittances
Smart Contracts
Smart Contracts Explained: Real-World Applications Beyond Crypto
Tokenization Of Real-World Assets
Tokenization Of Real-World Assets: The Next Big Crypto Trend!
how to spot Crypto Scam
How to Spot a Crypto Scam Before It's Too Late: Protect Your Investment!

Sustainability & Living

Green Building Certifications For Schools
Green Building Certifications For Schools: Boost Learning Environments!
Smart Water Management
Revolutionize Smart Water Management In Cities: Unlock the Future!
Homesteading’s Comeback Story, Why Americans Are Turning Back To Self Reliance In Record Numbers
Homesteading’s Comeback Story: Why Americans are Turning Back to Self Reliance In Record Numbers
Direct Air Capture_ The Machines Sucking CO2
Meet the Future with Direct Air Capture: Machines Sucking CO2!
Microgrid Energy Resilience
Embracing Microgrids: Decentralizing Energy For Resilience [Revolutionize Your World]

GAMING

Geek Appeal of Randomized Games
The Geek Appeal of Randomized Games Like Pokies
Best Way to Play Arknights on PC
The Best Way to Play Arknights on PC - Beginner’s Guide for Emulators
Cybet Review
Cybet Review: A Fast-Growing Crypto Casino with Fast Withdrawals and No-KYC Gaming
online gaming
Why Sign-Up Bonuses Are So Popular in Online Entertainment
How Online Gaming Platforms Build Trust
How Online Gaming Platforms Build Trust With New Users

Business & Marketing

The Basics of Inventory Management for Growing Businesses
Streamline Profits with The Basics Of Inventory Management for Growing Businesses
Vendor Negotiation Strategies to Cut Costs Fast
How to Negotiate Better Deals With Vendors
Strategic Sourcing vs Tactical Purchasing Key Differences
Strategic Sourcing Vs Tactical Purchasing: Key Differences
How AI Is Transforming Procurement and Sourcing
How AI Is Transforming Procurement and Sourcing
Top Procurement Software Platforms Compared
Top Procurement Software Platforms Compared

Technology & AI

AI Bias
The Rise of AI Bias: Why It Matters To Everyday Consumers
AI Voice Assistants
How AI Voice Assistants Are Getting Smarter Every Year?
AI In Entertainment
AI In Entertainment: How Algorithms Decide What You Watch
Ai In Financial Services
How AI Is Making Financial Services More Accessible: Unlocking Opportunities
How AI Is Transforming Procurement and Sourcing
How AI Is Transforming Procurement and Sourcing

Fitness & Wellness

Regenerative Baseline
Regenerative Baseline: The 2026 Mandatory Standard for Organic Luxury [Part 5]
Purposeful Walk Spaziergang
Mastering the Spaziergang: How a Purposeful Walk Can Reset Your Entire Week
Avtub
Avtub: The Ultimate Hub For Lifestyle, Health, Wellness, And More
Integrated Value Chain
The Resilience Framework: A Collaborative Integrated Value Chain Is Changing the Way We Eat [Part 4]
Nutrient Density Scoring
Beyond the Weight: Why Nutrient Density Scoring is the New Gold Standard for Food Value in 2026 [Part 3]