Apple Issues Emergency Patches for Critical Zero-Day WebKit Vulnerabilities Affecting 1.8 Billion Users

January 2, 2026
Apple Issues Emergency Patches for Critical Zero-Day WebKit Vulnerabilities Affecting 1.8 Billion Users
  • Apple issued emergency updates after two actively exploited zero-day WebKit vulnerabilities could allow remote code execution, prompting a company-wide push for iOS and iPadOS patches as about 1.8 billion users were warned.

  • The company warned users that the attack was highly sophisticated and targeted through WebKit-based browsers, affecting iPhone and iPad users globally.

  • Following the disclosures, Apple released patches that fix two zero-day flaws in WebKit across iPhone, iPad, and other Apple platforms, and automatic updates should apply these protections.

  • Industry context emphasizes rapid security responses, ongoing threat detection improvements, and potential future directions like AI-driven analytics and quantum-resistant cryptography.

  • Exfiltration of passwords, payment data, and other sensitive information was possible through compromised sites, with a likely focus on journalists, activists, and political figures.

  • Users on devices with automatic updates are protected; others should manually update via Settings > General > Software Update to install the patches.

  • The incident underscores broader enterprise risks from a single compromised device, plus possible regulatory discussions on vulnerability disclosure and the need for secure web technologies.

  • The pattern of repeated zero-days with swift responses echoes past NSO spyware incidents and reinforces the imperative to secure WebKit-driven content across ecosystems.

  • The patch demonstrates improved vulnerability management, though WebKit’s complexity remains a challenge for timely deployment across large organizations.

  • Security expert advice urged immediate installation, noting zero-days rely on users staying on outdated software.

  • Precautionary steps include avoiding suspicious links, manually typing URLs, enabling automatic updates, considering antivirus for high-risk users, and using Lockdown Mode for targeted individuals.

  • Disclosures credit Google Threat Analysis Group for helping identify CVE-2025-43529 and Apple for CVE-2025-14174, with a policy of withholding details until investigations and patches are ready.

Summary based on 3 sources


Get a daily email with more Tech stories

More Stories