Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Apple Patches Actively Exploited iOS Zero-Day Used in
Apple Patches Actively Exploited iOS Zero-Day Used in

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-20700

Apple Patches Actively Exploited iOS Zero-Day Used in

Apple has patched CVE-2026-20700, a memory corruption vulnerability in dyld used in 'extremely sophisticated' targeted attacks. Discovered by Google TAG,...

Dylan H.

Security Team

February 17, 2026
3 min read

Affected Products

  • iOS before 26.3
  • iPadOS before 26.3
  • macOS Tahoe before 26.3
  • watchOS before 26.3
  • tvOS before 26.3
  • visionOS before 26.3

"Extremely Sophisticated" — Apple's Own Words

Apple has released emergency security updates across all platforms to patch CVE-2026-20700, a memory corruption vulnerability in dyld — Apple's dynamic linker. Apple described the attacks exploiting this vulnerability as "extremely sophisticated" — language the company rarely uses.

The vulnerability was discovered by Google's Threat Analysis Group (TAG), which specifically tracks nation-state actors and commercial spyware vendors.


Vulnerability Details

FieldDetails
CVECVE-2026-20700
Componentdyld (dynamic linker)
TypeMemory Corruption
SeverityCritical
ExploitationConfirmed in targeted attacks
Discovered ByGoogle Threat Analysis Group (TAG)
TargetSpecific individuals

Why dyld Is Critical

The dynamic linker (dyld) loads shared libraries when any application launches. It runs early in the startup chain with elevated privileges — a vulnerability here provides:

  • Code execution before security checks initialize
  • Universal exploitation — every app uses dyld
  • Privilege escalation from user-level to system-level

The Full Infection Chain

CVE-2026-20700 was part of a multi-stage infection chain that includes two WebKit zero-days patched in December 2025:

Stage 1: Initial Compromise (WebKit Zero-Days)
├── CVE-2025-14174 — WebKit type confusion (RCE)
└── CVE-2025-43529 — WebKit sandbox escape
 
Stage 2: Persistence & Escalation (dyld Zero-Day)
└── CVE-2026-20700 — dyld memory corruption
 
Stage 3: Payload Deployment
└── Full device compromise with persistent implant

This chain is consistent with commercial spyware attack patterns — carefully constructed to achieve zero-click or one-click full device compromise.


Who Is Being Targeted?

Apple's "specific targeted individuals" language historically aligns with:

  • Journalists investigating sensitive topics
  • Human rights activists and dissidents
  • Government officials and diplomats
  • Opposition politicians in authoritarian states

Google TAG's involvement strongly suggests a commercial spyware vendor or nation-state intelligence agency.


Patched Versions

PlatformFixed Version
iOS26.3
iPadOS26.3
macOS Tahoe26.3
watchOS26.3
tvOS26.3
visionOS26.3

How to Update

  1. iPhone/iPad: Settings > General > Software Update — Install iOS/iPadOS 26.3
  2. Mac: System Settings > General > Software Update — macOS Tahoe 26.3
  3. Apple Watch: Watch app > General > Software Update
  4. Apple TV: Settings > System > Software Updates

Defensive Recommendations

  1. Update all Apple devices immediately
  2. Enable Lockdown Mode for high-risk individuals (journalists, activists, executives)
  3. Enable Rapid Security Response for automatic critical patches
  4. Monitor for compromise indicators using tools like iVerify

Sources

  • SecurityWeek — Apple Patches iOS Zero-Day Exploited in Extremely Sophisticated Attack
  • Malwarebytes — Apple Patches Zero-Day in Targeted Spyware Attacks
  • Help Net Security — Apple Zero-Day Fixed CVE-2026-20700

Related Reading

  • Apple Patches Actively Exploited Zero-Day in dyld
  • Apple Releases Critical Security Updates Across All
  • ZeroDayRAT Mobile Spyware Enables Total Surveillance of iOS
#Apple#iOS#Zero-Day#CVE-2026-20700#dyld#Spyware#Google TAG

Related Articles

Apple Patches Actively Exploited Zero-Day in dyld

Apple releases emergency patches across all platforms for a memory corruption vulnerability in the Dynamic Link Editor (dyld) that was exploited in...

4 min read

CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability allowing a malicious app to cause unexpected changes in...

6 min read

CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day

A maximum-severity authentication bypass in Cisco Catalyst SD-WAN (CVE-2026-20127, CVSS 10.0) has been actively exploited by threat actor UAT-8616 since...

4 min read
Back to all Security Alerts