Apple Patches Dozens of Vulnerabilities in macOS, iOS
Apple patches 60+ iOS/iPadOS and 80+ macOS vulnerabilities including WebKit issues.
Summary
Apple released 11 security advisories addressing over 60 CVEs in iOS 26.5 and iPadOS 26.5, including 20 WebKit vulnerabilities that can cause crashes, data exposure, and sandbox escapes. The same vulnerabilities were also patched in macOS Tahoe 26.5 (nearly 80 CVEs) and older macOS versions. A patched flaw previously exploited by the FBI to recover deleted Signal chats was backported to older iOS versions.
Full text
Apple on Monday published 11 new security advisories to inform customers about dozens of vulnerabilities patched in its operating systems. iOS and iPadOS 26.5 address more than 60 CVEs, including 20 WebKit issues that can lead to crashes, exposure of sensitive user data, and security bypasses. Other vulnerabilities can be exploited for DoS attacks, security bypass, sandbox escape, access to sensitive user data, privilege escalation, and user tracking. Dozens of the vulnerabilities patched in the latest iOS and iPadOS versions were also addressed by Apple with the release of macOS Tahoe 26.5, which resolves nearly 80 vulnerabilities. The security holes that are specific to macOS can be exploited to access user information, escalate privileges to root, escape the sandbox, cause a crash, bypass Gatekeeper, and execute arbitrary code with elevated privileges. Apple also patched dozens of these vulnerabilities in macOS Sequoia 15.7.7 and macOS Sonoma 14.8.7. Advertisement. Scroll to continue reading. watchOS, tvOS, and visionOS have also received security updates. Since they all share the same foundational architecture as iOS, many of the latest iOS patches have been included in these platform updates. Some advisories inform users that a recent patch for a flaw that can be exploited to recover deleted messages has been rolled out to older iOS versions. The FBI reportedly exploited the weakness to recover Signal chats from a device. Apple has not flagged any of the other vulnerabilities as being exploited in the wild. Related: Apple Debuts Background Security Improvements With Fresh WebKit Patches Related: Apple Rolls Out DarkSword Exploit Protection to More Devices Related: Apple Intelligence AI Guardrails Bypassed in New Attack Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Frame Security Emerges From Stealth With $50M for Awareness and Training PlatformGoogle Detects First AI-Generated Zero-Day ExploitCloudflare Lays Off 1,100 Employees in AI-Driven RestructuringNew ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in AttacksPolish Security Agency Reports ICS Breaches at Five Water Treatment PlantsRansomware Group Takes Credit for Trellix HackIvanti Patches EPMM Zero-Day Exploited in Targeted AttacksPalo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking Latest News White Circle Raises $11 Million for AI Control PlatformBWH Hotels Says Hackers Had Access to Reservation Data for 6 MonthsFree OnlyFans Lure Used to Spread Cross-Platform CRPx0 MalwareDeal Reached With Hackers to Delete Data Stolen From the Canvas Educational PlatformWest Pharmaceutical Services Hit by Disruptive Ransomware AttackSAP Patches Critical S/4HANA, Commerce VulnerabilitiesClaude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really MeansIs the SOC Obsolete, and We Just Haven’t Admitted It Yet? Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email