Description

Apple has released an urgent security update for iPhone and iPad users after confirming the active exploitation of two critical zero-day vulnerabilities in its WebKit browser engine. The flaws, identified as CVE-2025-43529 and CVE-2025-14174, were found to be used in highly targeted real-world attacks. These vulnerabilities allow attackers to execute malicious code on a device simply by convincing a user to load a specially crafted web page. Because WebKit powers Safari and all in-app web browsing on iOS, the risk exposure is significant, impacting a wide range of modern Apple devices running older versions of iOS. The issue is particularly serious because Apple stated that the attacks were “extremely sophisticated” and aimed at specific high-risk individuals. This type of language is often associated with advanced threat actors, including state-sponsored or mercenary spyware operators. The vulnerabilities stem from memory-handling weaknesses in WebKit, such as use-after-free and memory corruption bugs, which attackers can abuse to gain deeper control over a device. Since these exploits require no physical access and can be triggered remotely, even cautious users may be exposed through compromised websites or malicious advertisements. To reduce the risk, Apple strongly recommends that users update their devices immediately to iOS 26 or the latest available version. Keeping automatic updates enabled is critical to ensure timely protection against emerging threats. Users should also avoid visiting untrusted websites, be cautious with links received through messages or emails, and limit exposure to unnecessary web content. Organizations and high-risk individuals should prioritize patch deployment and consider additional mobile security monitoring to detect suspicious activity early.