Skip to main content
Mallory

Apple Patches Actively Exploited dyld Zero-Day in iOS and Other Platforms

actively-exploited-vulnerabilitywidely-deployed-product-advisoryendpoint-software-vulnerabilityrapid-weaponization
Updated March 21, 2026 at 02:33 PM3 sources
Share:
Apple Patches Actively Exploited dyld Zero-Day in iOS and Other Platforms

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Apple released security updates to address an actively exploited zero-day tracked as CVE-2026-20700, warning it may have been used in an “extremely sophisticated” attack targeting specific individuals on versions of iOS prior to iOS 26. The flaw affects dyld (Apple’s dynamic linker) and can allow arbitrary code execution when an attacker already has memory write capability; reporting attributes discovery to Google’s Threat Analysis Group and notes it may have been used as part of an exploit chain.

Apple shipped fixes across its ecosystem, including iOS 26.3, iPadOS 26.3, macOS Tahoe 26.3, watchOS 26.3, tvOS 26.3, and visionOS 26.3. The same reporting indicates Apple also issued patches tied to the broader report for CVE-2025-14174 (an out-of-bounds memory access issue in Chrome’s ANGLE graphics component on Mac) and CVE-2025-43529 (a use-after-free leading to code execution), and commentary from security practitioners emphasized that enterprise risk is driven by patch deployment speed—particularly where updates rely on end users rather than enforced device management.

Timeline

  1. Feb 12, 2026

    CISA adds CVE-2026-20700 to the KEV catalog

    After Apple's disclosure, CISA added CVE-2026-20700 to its Known Exploited Vulnerabilities catalog. CyberScoop described it as the first Apple issue CISA flagged as actively exploited in 2026.

  2. Feb 11, 2026

    Apple links two previously disclosed bugs to the same report

    In the same disclosure cycle, Apple also referenced CVE-2025-14174 and CVE-2025-43529 as having been addressed in response to the same report tied to CVE-2026-20700. Reporting noted these additional memory-safety flaws may have been part of a broader exploit chain, though Apple did not fully explain the relationship.

  3. Feb 11, 2026

    Apple patches CVE-2026-20700 and warns of targeted in-the-wild exploitation

    On 2026-02-11, Apple released security updates including iOS/iPadOS 26.3, macOS Tahoe 26.3, watchOS 26.3, tvOS 26.3, and visionOS 26.3 to fix CVE-2026-20700. Apple said the flaw may have been used in an 'extremely sophisticated' attack against specific targeted individuals and that it could allow arbitrary code execution when an attacker already has memory write capability.

  4. Feb 11, 2026

    Google discovers Apple dyld zero-day CVE-2026-20700

    Google's Threat Analysis Group/Threat Intelligence Group discovered a memory-corruption flaw in Apple's dyld component, tracked as CVE-2026-20700. Apple later credited Google with reporting the issue and said it affected iOS versions prior to iOS 26.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Apple Zero-Day CVE-2026-20700 Patched Across iOS, macOS, and Other Platforms

Apple Zero-Day CVE-2026-20700 Patched Across iOS, macOS, and Other Platforms

Apple released security updates for **CVE-2026-20700**, a **zero-day** in `dyld` (the Dynamic Link Editor) that can enable **arbitrary code execution** when an attacker already has a memory-write capability. Apple said it is aware the issue “may have been exploited” in **extremely sophisticated, targeted attacks** against specific individuals, and credited **Google Threat Analysis Group (TAG)** with discovery. Apple also linked the same incident reporting to two earlier vulnerabilities (**CVE-2025-14174** and **CVE-2025-43529**) that were previously addressed. The fixes were shipped across Apple’s ecosystem, including **iOS/iPadOS**, **macOS** (including *macOS Tahoe*), **tvOS**, **watchOS**, and **visionOS**; impacted device families include iPhone 11 and later and multiple iPad generations, as well as Macs running *macOS Tahoe*. Canadian Centre for Cyber Security guidance echoed Apple’s warning of potential exploitation and urged rapid patching (e.g., **iOS/iPadOS 18.7.5** and **26.3** releases for newer OS lines). Other vendor advisories published in the same period (HPE, Chrome, Intel, Fortinet, Siemens, Dell, CISA ICS, IBM, Red Hat) are unrelated to the Apple zero-day and reflect routine multi-vendor patch activity rather than the specific exploitation event.

1 months ago
Apple dyld Zero-Day (CVE-2026-20700) Added to CISA KEV After Targeted Exploitation

Apple dyld Zero-Day (CVE-2026-20700) Added to CISA KEV After Targeted Exploitation

Apple disclosed and patched **CVE-2026-20700**, a zero-day affecting `dyld` (Apple’s Dynamic Link Editor) across multiple operating systems (**iOS, iPadOS, macOS, tvOS, watchOS, and visionOS**). Apple said the issue was exploited in “**extremely sophisticated**” attacks targeting specific individuals and described the flaw as enabling **arbitrary code execution** when an attacker already has **memory-write capability**, indicating use in advanced exploit chains rather than opportunistic mass exploitation. CISA added **CVE-2026-20700** to the **Known Exploited Vulnerabilities (KEV) Catalog** based on evidence of active exploitation and set a remediation due date of **2026-03-05** for U.S. federal civilian agencies under **BOD 22-01**, while urging all organizations to prioritize patching. The same CISA KEV update also added three other actively exploited vulnerabilities—**CVE-2024-43468** (Microsoft Configuration Manager SQL injection), **CVE-2025-15556** (Notepad++ WinGUp updater integrity-check weakness), and **CVE-2025-40536** (SolarWinds Web Help Desk security control bypass)—but those are separate issues from the Apple `dyld` zero-day.

1 months ago
Apple Security Updates Address Multiple Vulnerabilities Including an In-the-Wild Exploited Memory Corruption Flaw

Apple Security Updates Address Multiple Vulnerabilities Including an In-the-Wild Exploited Memory Corruption Flaw

Apple issued security updates across its ecosystem to address **multiple vulnerabilities** affecting *iOS, iPadOS, macOS, tvOS, watchOS,* and *visionOS*, with impacts including **remote code execution (RCE)**, denial of service, elevation of privilege, information disclosure, data manipulation, and security restriction bypass. HKCERT highlighted **CVE-2026-20700** as a **high-risk** issue and noted it is **being exploited in the wild**; the flaw is described as an **improper restriction of operations within the bounds of a memory buffer** that could allow arbitrary code execution when an attacker has memory-write capability. Apple’s iOS 26.3 and iPadOS 26.3 security content includes fixes for issues that could expose sensitive information on a locked device (e.g., **CVE-2026-20645** and **CVE-2026-20674**) and a Bluetooth-related denial-of-service condition where a privileged network attacker could trigger DoS using crafted packets (**CVE-2026-20650**). The updates apply to **iPhone 11 and later** and a range of supported iPad models, and Apple reiterated its policy of publishing details after patches are available.

2 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.