Apple Issues Emergency Patches for Critical Zero-Day WebKit Vulnerabilities Affecting 1.8 Billion Users
January 2, 2026
Apple issued emergency updates after two actively exploited zero-day WebKit vulnerabilities could allow remote code execution, prompting a company-wide push for iOS and iPadOS patches as about 1.8 billion users were warned.
The company warned users that the attack was highly sophisticated and targeted through WebKit-based browsers, affecting iPhone and iPad users globally.
Following the disclosures, Apple released patches that fix two zero-day flaws in WebKit across iPhone, iPad, and other Apple platforms, and automatic updates should apply these protections.
Industry context emphasizes rapid security responses, ongoing threat detection improvements, and potential future directions like AI-driven analytics and quantum-resistant cryptography.
Exfiltration of passwords, payment data, and other sensitive information was possible through compromised sites, with a likely focus on journalists, activists, and political figures.
Users on devices with automatic updates are protected; others should manually update via Settings > General > Software Update to install the patches.
The incident underscores broader enterprise risks from a single compromised device, plus possible regulatory discussions on vulnerability disclosure and the need for secure web technologies.
The pattern of repeated zero-days with swift responses echoes past NSO spyware incidents and reinforces the imperative to secure WebKit-driven content across ecosystems.
The patch demonstrates improved vulnerability management, though WebKit’s complexity remains a challenge for timely deployment across large organizations.
Security expert advice urged immediate installation, noting zero-days rely on users staying on outdated software.
Precautionary steps include avoiding suspicious links, manually typing URLs, enabling automatic updates, considering antivirus for high-risk users, and using Lockdown Mode for targeted individuals.
Disclosures credit Google Threat Analysis Group for helping identify CVE-2025-43529 and Apple for CVE-2025-14174, with a policy of withholding details until investigations and patches are ready.
Summary based on 3 sources
Get a daily email with more Tech stories
Sources

WebProNews • Jan 2, 2026
Apple Patches Zero-Day iPhone Vulnerabilities Linked to Pegasus Spyware
JOE.co.uk • Jan 2, 2026
Apple issues warning to 1.8bn iPhone users over security threat
Technobezz • Jan 2, 2026
Apple patches two actively exploited zero-day vulnerabilities in WebKit