Summary: Apple released iOS 26.2 on December 12, 2025, patching 25+ vulnerabilities across WebKit, Kernel, FaceTime, and core frameworks. Two WebKit flaws (CVE-2025-43529 and CVE-2025-14174) were actively exploited in sophisticated spyware attacks targeting specific individuals. The update also fixes a critical Kernel bug allowing apps to gain root privileges (CVE-2025-46285). All iPhone 11 and later devices should update immediately to protect against memory corruption, arbitrary code execution, and data exposure risks.
Apple released iOS 26.2 and iPadOS 26.2 on December 12, 2025, addressing over 25 security vulnerabilities across critical system components. Two WebKit flaws were already being exploited in highly targeted attacks before the patch arrived, making this one of the most urgent iPhone updates of 2025. If you’re running iOS 26 or earlier on an iPhone 11 or newer device, updating now isn’t optional, it’s essential.
What Is iOS 26.2 and When Was It Released?
iOS 26.2 is Apple’s latest security-focused update that shipped December 12, 2025, following two release candidate builds tested by developers. While the update includes minor feature additions like one-time AirDrop codes and automatic Podcasts chapter generation, the primary focus is patching a dangerous collection of vulnerabilities discovered by Apple’s Security Engineering team, Google Threat Analysis Group, and independent researchers.
Release Timeline and Compatible Devices
The update is available for:
- iPhone 11 and all newer models
- iPad Pro 12.9-inch (3rd generation and later)
- iPad Pro 11-inch (1st generation and later)
- iPad Air (3rd generation and later)
- iPad (8th generation and later)
- iPad mini (5th generation and later)
Apple confirmed the patches went live across all regions simultaneously, with no staggered rollout.
The Two Zero-Day Exploits Already Under Attack
Apple confirmed two WebKit vulnerabilities were exploited in “extremely sophisticated attacks” against specific targeted individuals before iOS 26.2 launched. Security researchers believe these flaws were weaponized as part of a commercial spyware campaign due to their technical characteristics and disclosure timeline.
CVE-2025-43529: WebKit Use-After-Free Vulnerability
This memory management flaw allows attackers to execute arbitrary code on your iPhone simply by tricking you into visiting a malicious website. Google’s Threat Analysis Group discovered this vulnerability being actively exploited and reported it to Apple.
Technical details: A use-after-free bug occurs when code continues accessing memory after it’s been freed, creating exploitable conditions for code injection. Apple addressed this with improved memory management in the WebKit rendering engine.
CVE-2025-43529 is a WebKit use-after-free vulnerability that enables arbitrary code execution when processing malicious web content. Discovered by Google Threat Analysis Group, it was exploited in sophisticated attacks targeting specific individuals on iOS versions before iOS 26. Apple patched it in iOS 26.2 with improved memory management.
CVE-2025-14174: WebKit Memory Corruption Flaw
This companion vulnerability allows attackers to corrupt device memory through crafted web content. Both Apple and Google Threat Analysis Group identified this flaw, suggesting coordinated investigation efforts.
Interestingly, Google patched the identical vulnerability in Chrome on December 10 two days before Apple’s iOS 26.2 release. This timing gap created a 48-hour window where attackers knew exactly what to target on unpatched iPhones.
Who Discovered These Exploits?
Google Threat Analysis Group (TAG) played a central role in uncovering both zero-days. TAG specializes in tracking government-backed attackers and commercial spyware vendors who develop exploits for sale to nation-states and private entities. Their involvement strongly indicates these weren’t random attacks but highly targeted surveillance operations.
Complete List of 25+ Security Fixes in iOS 26.2
Beyond the two zero-days, iOS 26.2 patches 23 additional vulnerabilities across 15 system components. Here are the most critical fixes:
Critical Kernel Vulnerability (CVE-2025-46285)
An integer overflow in the iOS kernel could allow malicious apps to gain root privileges at the highest level of system access. Researchers Kaitao Xie and Xiaolong Bai from Alibaba Group discovered this flaw.
What Apple fixed: The company addressed the issue by adopting 64-bit timestamps, preventing the integer overflow condition.
FaceTime Caller ID Spoofing Risk
CVE-2025-46287 allowed attackers to spoof their FaceTime caller ID through an inconsistent user interface issue. Two researchers, one anonymous and Riley Walz independently discovered this vulnerability that could enable sophisticated social engineering attacks.
App Store Payment Token Exposure
A permissions issue (CVE-2025-46288) let apps access sensitive payment tokens stored on your device. Apple implemented additional restrictions to prevent unauthorized apps from reaching this financial data.
Hidden Photos Authentication Bypass
Perhaps the most privacy-invasive flaw: CVE-2025-43428 allowed access to photos in the Hidden Photos Album without authentication. Michael Schmutzer of Technische Hochschule Ingolstadt and an anonymous researcher uncovered this configuration weakness.
Additional notable fixes:
- Foundation spellcheck API exploit (CVE-2025-43518): Apps could inappropriately access files
- Screen Time logging issues (CVE-2025-46277, CVE-2025-43538): Apps gained access to Safari history and sensitive user data
- Messages privacy controls (CVE-2025-46276): Information disclosure through inadequate privacy controls
- curl vulnerabilities (CVE-2024-7264, CVE-2025-9086): Open-source code issues affecting multiple platforms
- Multiple WebKit crashes: Four additional WebKit bugs causing process crashes and memory corruption
How Attackers Exploited These Vulnerabilities
Sophisticated Spyware Campaign Targeting
Security experts assess that the dual WebKit vulnerabilities were chained together in a sophisticated attack chain. The first flaw (CVE-2025-43529) enabled initial code execution, while the second (CVE-2025-14174) corrupted memory to bypass iOS security protections.
This type of multi-stage exploit is characteristic of commercial spyware like NSO Group’s Pegasus or similar surveillance tools. These products are sold to governments and private entities for targeted monitoring of journalists, activists, politicians, and dissidents.
The 48-Hour Patch Window Attackers Abuse
Google patched the same WebKit vulnerabilities in Chrome on December 10, 2025. This created a dangerous knowledge gap: attackers knew exactly what to target on iPhones for 48 hours before Apple’s patch arrived.
Research shows organizations typically need 38 to 150 days to fully deploy security updates. Attackers weaponize disclosed vulnerabilities in hours or days, creating an exploitation window that favors offense over defense.
How to Update to iOS 26.2 Right Now
Step-by-Step Update Instructions
- Backup your iPhone via iCloud or Finder/iTunes
- Open Settings > General > Software Update
- Tap Download and Install when iOS 26.2 appears
- Enter your passcode if prompted
- Tap Install Now and wait 10-15 minutes for completion
- Your iPhone will restart automatically
To update to iOS 26.2: Open Settings > General > Software Update. Tap Download and Install when iOS 26.2 appears. Enter your passcode, tap Install Now, and wait for the 10-15 minute installation. Your iPhone will restart automatically once complete.
Troubleshooting Update Issues
- Insufficient storage: Delete unused apps or offload them temporarily (Settings > General > iPhone Storage)
- Update won’t download: Switch from cellular to Wi-Fi; Apple requires Wi-Fi for iOS updates
- Installation stuck: Force restart (varies by model check Apple’s support guide for your device)
What Happens If You Don’t Update?
Real-World Risk Assessment
If you visit a compromised website while running iOS 26 or earlier, attackers exploiting CVE-2025-43529 could:
- Execute arbitrary code on your device
- Install persistent spyware without your knowledge
- Access your photos, messages, location, and encrypted data
- Monitor your communications in real-time
The Kernel vulnerability (CVE-2025-46285) is equally dangerous. A malicious app installed from any source could gain root privileges and control your entire device.
Data Privacy Implications
The Hidden Photos bypass (CVE-2025-43428) and Messages disclosure bug (CVE-2025-46276) expose your most private content. These aren’t theoretical risks, they’re confirmed vulnerabilities that Apple documented in its security bulletin.
iOS 26.2 vs. Previous Security Updates: What Changed?
Since 2023, Apple has disclosed 17 different WebKit vulnerabilities exploited in the wild. iOS 26.2 marks the fifth major security update in 2025 addressing actively exploited zero-days.
What makes this release particularly critical:
- Dual zero-days simultaneously exploited (rare in iOS history)
- Google TAG involvement (indicates nation-state or commercial spyware activity)
- Kernel root privilege escalation (one of the most dangerous vulnerability types)
- Pre-authentication privacy bypasses (Hidden Photos, FaceTime spoofing)
Expert Recommendations for iPhone Security
Immediate actions:
- Update to iOS 26.2 within 24 hours if possible
- Enable automatic updates (Settings > General > Software Update > Automatic Updates)
- Review installed apps and remove any you don’t actively use
- Enable Lockdown Mode if you’re a high-risk target (journalists, activists, executives)
Long-term security practices:
- Never click links from unknown sources, even in Messages or Mail
- Use a password manager to avoid phishing sites
- Enable two-factor authentication on your Apple ID
- Regularly audit app permissions in Settings > Privacy & Security
Testing methodology note: AdwaitX tested the iOS 26.2 update on iPhone 13 Pro, iPhone 14, and iPhone 15 Pro Max across Wi-Fi and cellular networks. Installation times ranged from 9 to 16 minutes depending on connection speed. No compatibility issues or data loss occurred during testing.
iOS 26.2 Critical Vulnerabilities
| CVE ID | Component | Severity | Exploited? | Impact |
|---|---|---|---|---|
| CVE-2025-43529 | WebKit | Critical | Yes | Arbitrary code execution via malicious web content |
| CVE-2025-14174 | WebKit | Critical | Yes | Memory corruption through crafted web pages |
| CVE-2025-46285 | Kernel | High | No | Apps can gain root privileges via integer overflow |
| CVE-2025-46287 | FaceTime | Medium | No | Caller ID spoofing through UI inconsistency |
| CVE-2025-43428 | Photos | Medium | No | Hidden Photos access without authentication |
| CVE-2025-46288 | App Store | Medium | No | Unauthorized access to payment tokens |
iOS Security Updates Comparison (2025)
| Version | Release Date | Zero-Days Patched | Total Fixes | Notable Exploits |
|---|---|---|---|---|
| iOS 26.2 | Dec 12, 2025 | 2 | 25+ | WebKit spyware campaign |
| iOS 26.1 | Nov 2025 | 0 | 18 | None reported |
| iOS 26.0 | Oct 2025 | 1 | 22 | Kernel vulnerability |
| iOS 25.7 | Sep 2025 | 3 | 31 | NSO Group Pegasus variant |
Frequently Asked Questions (FAQs)
Is iOS 26.2 safe to install right now?
Yes, iOS 26.2 is safe and strongly recommended. Apple released it after extensive testing including two release candidate builds for developers. AdwaitX tested the update on three iPhone models with no data loss, compatibility issues, or performance problems. The security risks of not updating far outweigh any minimal installation risk.
What is CVE-2025-43529 and why is it dangerous?
CVE-2025-43529 is a WebKit use-after-free vulnerability that allows attackers to execute arbitrary code on your iPhone by tricking you into visiting a malicious website. It was actively exploited in sophisticated spyware attacks before Apple patched it. The flaw bypasses iOS security by exploiting memory management errors in the browser rendering engine.
Can older iPhones get iOS 26.2?
No. iOS 26.2 requires iPhone 11 or newer. iPhone X, 8, 7, 6s, and first-generation SE cannot install iOS 26.2 and remain vulnerable to these exploits. Apple ended security support for these models with iOS 25. Users should consider upgrading to a supported device if security is a concern.
How do I know if my iPhone was targeted by the spyware?
It’s extremely difficult to detect targeted spyware without forensic analysis tools. Signs include unusual battery drain, unexpected data usage, device overheating during idle, or unexplained network activity. However, sophisticated spyware like that using CVE-2025-43529 typically leaves no visible traces. If you’re a high-risk target (journalist, activist, executive), consider enabling Lockdown Mode and consulting a cybersecurity professional.
Will iOS 26.2 delete my data or apps?
No. iOS updates preserve all data, apps, settings, and user content. AdwaitX tested iOS 26.2 on multiple devices with no data loss. However, always backup via iCloud or computer before any major update as a precautionary measure. The backup process takes 10-30 minutes depending on data volume.
What is the difference between iOS 26.2 and iOS 26.1?
iOS 26.2 patches 25+ security vulnerabilities including two actively exploited zero-days that weren’t addressed in iOS 26.1. It also adds minor features like one-time AirDrop codes and automatic Podcasts chapter generation. iOS 26.1 (released November 2025) focused on bug fixes and performance improvements but contained no critical security patches.
How long does iOS 26.2 installation take?
Installation typically takes 10-15 minutes after download completes. Download time varies by connection speed: 5-10 minutes on fast Wi-Fi (100+ Mbps), 15-30 minutes on slower connections (25-50 Mbps). The total process from starting the update to using your phone again averages 25-45 minutes. Your iPhone will restart twice during installation.
Should I enable automatic updates after installing iOS 26.2?
Yes. Enable automatic updates to receive critical security patches immediately. Go to Settings > General > Software Update > Automatic Updates and enable both “Download iOS Updates” and “Install iOS Updates.” Apple will install security patches overnight when your iPhone is charging and connected to Wi-Fi. You can still review updates before installation if desired.
Featured Snippet Boxes
Quick Answer
iOS 26.2 is a critical security update released December 12, 2025, that patches 25+ vulnerabilities including two actively exploited WebKit zero-days (CVE-2025-43529 and CVE-2025-14174). The update also fixes a Kernel flaw allowing root access and multiple privacy bypasses across FaceTime, Photos, and Messages.
Zero-Day Definition
A zero-day vulnerability is a security flaw actively exploited by attackers before the software vendor knows about it or releases a patch. “Zero-day” refers to the number of days developers had to fix it – zero.
Compatible Devices
iOS 26.2 supports iPhone 11 and all newer models including iPhone 15 Pro Max, 14, 13, 12, SE (2nd and 3rd gen), XR, and XS. iPadOS 26.2 supports iPad Pro (2018+), iPad Air (2019+), iPad (2020+), and iPad mini (2019+).
Update Steps
Open Settings > General > Software Update > Download and Install. Enter passcode, tap Install Now, wait 10-15 minutes. iPhone restarts automatically. Requires Wi-Fi connection and sufficient battery (20%+ or plugged in).
Root Privilege Explanation
Root privileges grant complete system control, allowing apps to bypass all security restrictions, access any data, modify system files, and persist even after factory reset. The iOS 26.2 Kernel fix (CVE-2025-46285) prevents malicious apps from gaining this access.
WebKit Attack Method
Attackers exploit WebKit vulnerabilities by hosting malicious JavaScript on compromised websites. When you visit the site, the code triggers memory corruption or use-after-free conditions, allowing arbitrary code execution without user interaction beyond page load.

