Apple has released emergency security updates to address a critical zero-day vulnerability, tracked as CVE-2026-20700, that was already being used in real-world attacks. The flaw was discovered in dyld (Dynamic Link Editor), a core operating system component responsible for loading and running applications across Apple devices.
Because dyld operates deep within the OS, the vulnerability was considered highly severe. If exploited, it could allow attackers to execute malicious code, potentially giving them control over a device, access to sensitive data, or the ability to deploy spyware.
Apple confirmed the vulnerability was used in “extremely sophisticated” targeted attacks. While the company did not disclose who was targeted, the language strongly suggests precision attacks rather than large-scale campaigns.
Affected Devices
Since dyld is shared across Apple platforms, multiple operating systems were impacted. Security patches were released for:
- iOS 26.3
- iPadOS 26.3
- macOS Tahoe 26.3
- watchOS 26.3
- tvOS 26.3
- visionOS 26.3
Apple also pushed fixes to older supported OS versions to reduce exposure across its device ecosystem.
How the Attack Likely Worked
Researchers believe attackers may have combined this dyld flaw with earlier WebKit vulnerabilities. WebKit powers Safari and many apps that render web content.
By chaining vulnerabilities together, attackers can move from an initial entry point — such as a malicious website, to deeper system-level control. This technique is increasingly common in advanced targeted attacks.
Why This Matters
Zero-days are especially dangerous because they are exploited before patches are available. Until updates are released and installed, users have little to no protection.
This case also highlights the broader risk of shared open-source components. While open-source software improves transparency and collaboration, a single weakness can impact millions of devices simultaneously.
What Users Should Do
- Update all Apple devices immediately
- Enable automatic updates
- Ensure corporate devices follow strict patch management policies
Even when attacks appear targeted, unpatched devices can still become potential entry points. Keeping systems updated remains one of the simplest and most effective security measures.
Caught feelings for cybersecurity? It’s okay, it happens. Follow us on LinkedIn, Youtube and Instagram to keep the spark alive.