KIOXIA NVME
News

Apple Fixes Critical iOS Vulnerability Present Since Version 1.0

Apple Fixes Critical iOS Vulnerability Present Since Version 1.0

Apple has patched a critical vulnerability that had gone unnoticed in iOS since its very first version released in 2007. The security flaw, identified as CVE-2026-20700 and discovered by Google’s Threat Analysis Group, affects dyld, the operating system’s dynamic linker. It allows attackers with memory write access to execute arbitrary code on the device.

According to Apple’s security advisory, the company is aware that this vulnerability was actively exploited in what it described as “an extremely sophisticated attack against specific targeted individuals” on versions of iOS prior to iOS 26. Apple also stated that the flaw may have been part of a more complex exploit chain.

Apple Patches Long-Standing iOS Security Flaw

Brian Milbier, Deputy CISO at Huntress, explained the seriousness of the issue by comparing dyld to a doorman (thanks The Register):

Think of dyld as the doorman for your phone. Every single app that wants to run must first pass through this doorman to be assembled and given permission to start. Usually, the doorman checks credentials and places apps in a high-security ‘sandbox’ where they can’t touch your private data. This vulnerability allows an attacker to trick the doorman into handing over a master key before security checks even begin.

By combining this flaw with WebKit vulnerabilities that Apple also addressed in the iOS 26.3 update, attackers could create a “zero-click” or “one-click” path to full device control. Milbier noted that this level of sophistication resembles exploits developed by the commercial surveillance industry, known for spyware tools such as Pegasus and Predator, which are sold to government clients.

The iOS 26.3 update also includes fixes for other vulnerabilities that could grant root access or expose sensitive user information. However, CVE-2026-20700 is the only flaw that Apple confirmed had been actively exploited in real-world attacks.

KIOXIA NVME
Sapphire Crimson Desert
INNO3D RTX 50 Series
KIOXIA NVME
KIOXIA NVME
INNO3D RTX 50 Series
Gigabyte AERO X16
Gigabyte AERO X16
KIOXIA NVME

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Close

Adblock Detected

Please consider supporting us by disabling your ad blocker!   eTeknix prides itself on supplying the most accurate and informative PC and tech related news and reviews and this is made possible by advertisements but be rest assured that we will never serve pop ups, self playing audio ads or any form of ad that tracks your information as your data security is as important to us as it is to you.   If you want to help support us further you can over on our Patreon!   Thank you for visiting eTeknix