Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Apple Releases Critical Security Updates Across All
Apple Releases Critical Security Updates Across All
NEWS

Apple Releases Critical Security Updates Across All

Apple has released security updates for iOS, macOS, watchOS, and tvOS addressing multiple actively exploited vulnerabilities. Users urged to update immediately.

Dylan H.

Security Engineer

January 6, 2026
3 min read

Apple Releases Critical Security Updates

Apple has released security updates across all its platforms, addressing multiple vulnerabilities including two that were actively exploited in the wild.

Updates Released

PlatformVersionCritical Fixes
iOS/iPadOS18.2.12 zero-days
macOS Sequoia15.2.13 critical
macOS Sonoma14.7.32 critical
watchOS11.2.11 critical
tvOS18.2.11 critical

Actively Exploited Vulnerabilities

CVE-2026-23456 - WebKit Use-After-Free

  • Severity: High
  • Impact: Remote code execution via malicious web content
  • Exploited: Yes, targeted attacks observed
  • Platforms: iOS, iPadOS, macOS, watchOS

CVE-2026-23457 - Kernel Privilege Escalation

  • Severity: High
  • Impact: Local privilege escalation to kernel level
  • Exploited: Yes, chained with CVE-2026-23456
  • Platforms: All Apple platforms

Attack Chain

Security researchers describe the attack flow:

  1. Victim visits malicious website
  2. WebKit vulnerability triggers
  3. Initial code execution achieved
  4. Kernel exploit escalates privileges
  5. Full device compromise

Targeted Attacks

Apple's advisory indicates:

  • Attacks were "highly targeted"
  • Specific individuals/groups were victims
  • Nation-state involvement suspected
  • Spyware deployment observed

Additional Vulnerabilities Fixed

Beyond the zero-days:

  • ImageIO: Buffer overflow in image processing
  • Bluetooth: Authentication bypass
  • CoreAudio: Memory corruption
  • Kernel: Multiple memory safety issues
  • WebKit: Additional type confusion fixes

How to Update

iPhone/iPad

  1. Settings > General > Software Update
  2. Download and Install
  3. Device will restart

Mac

  1. System Settings > General > Software Update
  2. Click Update Now
  3. Restart when prompted

Apple Watch

  1. Open Watch app on iPhone
  2. General > Software Update
  3. Install while watch is charging

Checking Your Version

Ensure you're running:

  • iOS/iPadOS: 18.2.1 or later
  • macOS Sequoia: 15.2.1 or later
  • macOS Sonoma: 14.7.3 or later
  • watchOS: 11.2.1 or later

Apple's 2026 Security Response

This marks Apple's first major security update of 2026:

  • Rapid response to exploit reports
  • Comprehensive platform coverage
  • Backported fixes to older macOS versions
  • Enhanced security researcher rewards

Recommendations

For All Users

  1. Update immediately: Don't delay security updates
  2. Enable automatic updates: Settings > General > Software Update
  3. Use Safari protections: Enable Lockdown Mode for high-risk users
  4. Be cautious: Avoid suspicious links

For Enterprise

  1. Deploy updates urgently: Within 48 hours
  2. Monitor for exploitation: Check for IoCs
  3. Review MDM policies: Ensure update compliance
  4. User communication: Alert users to update personal devices

Lockdown Mode Reminder

For users at elevated risk (journalists, activists, executives):

  1. Settings > Privacy & Security > Lockdown Mode
  2. Significantly reduces attack surface
  3. Some features limited for security

Next Steps

Apple typically releases:

  • Additional patches as issues emerge
  • iOS 18.3 expected in February
  • Continued security updates for older versions

Sources: Apple Security Updates, BleepingComputer, SecurityWeek

Related Reading

  • Apple Patches Actively Exploited Zero-Day in dyld
  • Apple Patches Actively Exploited iOS Zero-Day Used in
  • ZeroDayRAT Mobile Spyware Enables Total Surveillance of iOS
#Apple#iOS#macOS#Zero-Day#Security Update

Related Articles

CISA Adds Apple DarkSword iOS Exploits, Craft CMS, and Laravel Livewire Flaws to KEV Catalog

CISA orders federal agencies to patch five actively exploited vulnerabilities by April 3, including three Apple flaws linked to the DarkSword iOS exploit...

3 min read

DarkSword GitHub Leak Threatens to Turn Elite iPhone Hacking Into a Tool for the Masses

Researchers say the GitHub leak of the DarkSword iOS exploit chain — six chained vulnerabilities targeting iOS 18.4 through 18.7 — threatens to...

5 min read

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

A newly observed ClickFix campaign impersonates Cloudflare's CAPTCHA verification pages to deliver the Python-based Infiniti Stealer to macOS users via a multi-stage chain involving a Bash script and a Nuitka-compiled loader.

4 min read
Back to all News