Description:
Apple has released iOS 26.5, iPadOS 26.5, iOS 18.7.9, iPadOS 18.7.9, iPadOS 17.7.11, iOS 16.7.16, iPadOS 16.7.16, iOS 15.8.8, iPadOS 15.8.8, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, watchOS 26.5 and visionOS 26.5 to fix the vulnerabilities in various Apple devices. The list of vulnerabilities information can be found at:
https://support.apple.com/en-us/127110
https://support.apple.com/en-us/127111
https://support.apple.com/en-us/127112
https://support.apple.com/en-us/127113
https://support.apple.com/en-us/127114
https://support.apple.com/en-us/127115
https://support.apple.com/en-us/127116
https://support.apple.com/en-us/127117
https://support.apple.com/en-us/127118
https://support.apple.com/en-us/127119
https://support.apple.com/en-us/127120
Affected Systems:
- iPhone XS and later, iPhone 6s and later
- iPad 5th generation and later, Air 2, Air 3rd generation and later, mini 4th generation and later, Pro 9.7-inch, Pro 11-inch 1st generation and later, Pro 12.9-inch 1st generation and later
- iPod touch (7th generation)
- macOS Sequoia prior to version 15.7.7
- macOS Sonoma prior to version 14.8.7
- macOS Tahoe prior to version 26.5
- tvOS prior to version 26.5
- visionOS prior to version 26.5
- watchOS prior to version 26.5
Impact:
Depending on the vulnerabilities exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security restriction bypass or tampering on an affected system.
Recommendation:
Patches for affected products are available. Users of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
The updates can be obtained through the auto-update mechanism. Users of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://support.apple.com/en-us/127110
- https://support.apple.com/en-us/127111
- https://support.apple.com/en-us/127112
- https://support.apple.com/en-us/127113
- https://support.apple.com/en-us/127114
- https://support.apple.com/en-us/127115
- https://support.apple.com/en-us/127116
- https://support.apple.com/en-us/127117
- https://support.apple.com/en-us/127118
- https://support.apple.com/en-us/127119
- https://support.apple.com/en-us/127120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43524
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1837
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28846 (to CVE-2026-28848)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28872 (to CVE-2026-28873)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28877 (to CVE-2026-28878)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28882 (to CVE-2026-28883)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28894
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28897
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28901 (to CVE-2026-28908)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28913 (to CVE-2026-28915)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28917 (to CVE-2026-28920)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28922 (to CVE-2026-28925)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28929 (to CVE-2026-28930)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28936
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28940 (to CVE-2026-28944)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28946 (to CVE-2026-28947)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28950 (to CVE-2026-28959)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28961 (to CVE-2026-28965)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28969
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28971 (to CVE-2026-28972)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28974
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28976 (to CVE-2026-28978)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28983
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28985 (to CVE-2026-28988)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28990 (to CVE-2026-28996)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-39869 (to CVE-2026-39871)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43652 (to CVE-2026-43656)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43658 (to CVE-2026-43661)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43666
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43668