Tuesday, March 17, 2026

Apple Releases iOS 26.1 And iPadOS 26.1 To Fix Multiple Critical Security Flaws

Apple rolled out iOS 26.1 and iPadOS 26.1 on November 3, 2025, addressing a slew of security flaws that could expose users to privacy breaches, system crashes, and data leaks.

These updates target devices starting from iPhone 11 and later models, including iPad Pro (12.9-inch 3rd generation and newer), iPad Pro (11-inch 1st generation and newer), iPad Air (3rd generation and newer), iPad (8th generation and newer), and iPad mini (5th generation and newer).

As with Apple’s standard practice, the company withholds details on vulnerabilities until patches are ready, referencing them by CVE identifiers where applicable.

The updates fix over 40 issues across core components like WebKit, the Kernel, and various system services.

Many stem from memory handling errors, logic flaws, and privacy oversights that malicious apps or websites could exploit.

For instance, WebKit the engine powering Safari sees the bulk of repairs, tackling use-after-free bugs, buffer overflows, and cross-origin data exfiltration risks.

These could crash Safari or allow sites to steal sensitive information without permission.

Key Privacy and System Protections

Privacy remains a focal point, with fixes preventing apps from fingerprinting users, accessing protected data, or tracking installations via caches.

In the Apple Neural Engine, improved memory handling thwarts kernel corruption that might lead to system crashes.

Kernel updates curb unexpected terminations, while Stolen Device Protection gains logic to block physical attackers from disabling it on iPhone 11 and later.

Other notable patches include Camera enhancements to hide view details pre-permission, Contacts logging redactions to avoid data exposure, and Text Input restrictions that keep keyboard suggestions from revealing lock screen info.

Control Center and Status Bar fixes limit what attackers with physical access can glimpse on locked devices.

Vulnerability Summary Table

CVE IDComponentImpactDescription BriefResearcher(s)
CVE-2025-43480WebKitCross-origin data exfiltrationImproved checksAleksejs Popovs
CVE-2025-43447Apple Neural EngineSystem termination or kernel corruptionBetter memory handlingAnonymous
CVE-2025-43398KernelUnexpected system terminationImproved memory handlingCristian Dinca
CVE-2025-43422Stolen Device ProtectionDisable protection via physical accessAdded logicWill Caine
CVE-2025-43452Text InputSensitive info on lock screenRestricted locked-device optionsMultiple (e.g., Thomas Salomon)
CVE-2025-43379AppleMobileFileIntegrityAccess protected user dataSymlink validationGergely Kalman

Apple credits researchers like those from Trend Micro’s Zero Day Initiative and ByteDance for disclosures.

Users should update immediately via Settings > General > Software Update to stay protected.

No widespread exploits have been reported yet, but timely patching is crucial in an era of evolving threats.

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent News

Recent News