Apple has launched emergency updates to patch two zero-day vulnerabilities that had been exploited in an “extraordinarily subtle assault” concentrating on particular people.
The zero-days are tracked as CVE-2025-43529 and CVE-2025-14174 and had been each issued in response to the identical reported exploitation.
“Apple is conscious of a report that this difficulty might have been exploited in an especially subtle assault in opposition to particular focused people on variations of iOS earlier than iOS 26,” reads Apple’s safety bulletin.
CVE-2025-43529 is a WebKit use-after-free distant code execution flaw that may be exploited by processing maliciously crafted net content material. Apple says the flaw was found by Google’s Risk Evaluation Group.
CVE-2025-14174 is a WebKit reminiscence corruption flaw that would result in reminiscence corruption. Apple says the flaw was found by each Apple and Google’s Risk Evaluation Group.
Gadgets impacted by each flaws embody:
-
iPhone 11 and later
-
iPad Professional 12.9-inch (third era and later)
-
iPad Professional 11-inch (1st era and later)
-
iPad Air (third era and later)
-
iPad (eighth era and later)
-
iPad mini (fifth era and later)
Apple has mounted the issues in OS 26.2 and iPadOS 26.2, iOS 18.7.3 and iPadOS 18.7.3, macOS Tahoe 26.2, tvOS 26.2, watchOS 26.2, visionOS 26.2, and Safari 26.2.
On Wednesday, Google mounted a mysterious zero-day flaw in Google Chrome, initially labeling it as “[N/A][466192044] Excessive: Beneath coordination.”
Nonetheless, Google has now up to date the advisory to establish the bug as “CVE-2025-14174: Out-of-bounds reminiscence entry in ANGLE,” which is identical CVE mounted by Apple, indicating coordinated disclosure between the 2 corporations.
Apple has not disclosed technical particulars concerning the assaults past saying they focused people operating variations of iOS earlier than iOS 26.
As each flaws have an effect on WebKit, which Google Chrome makes use of on iOS, the exercise is per extremely focused spy ware assaults.
Whereas these flaws had been solely exploited in focused assaults, customers are strongly suggested to put in the newest safety updates promptly to scale back the chance of ongoing exploitation.
With these fixes, Apple has now patched seven zero-day vulnerabilities that had been exploited within the wild in 2025, starting with CVE-2025-24085 in January, CVE-2025-24200 in February, CVE-2025-24201 in March, and two extra in April (CVE-2025-31200 and CVE-2025-31201).
In September, Apple additionally backported a repair for a zero-day tracked as CVE-2025-43300 to older units operating iOS 15.8.5 / 16.7.12 and iPadOS 15.8.5 / 16.7.12.
Damaged IAM is not simply an IT downside – the influence ripples throughout your entire enterprise.
This sensible information covers why conventional IAM practices fail to maintain up with fashionable calls for, examples of what “good” IAM appears to be like like, and a easy guidelines for constructing a scalable technique.

