PT-2026-7805 · Apple · Dyld+6
Published
2026-02-11
·
Updated
2026-03-30
·
CVE-2026-20700
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Apple iOS, iPadOS, macOS, watchOS, tvOS, and visionOS versions prior to 26.3
Description
Apple addressed a zero-day vulnerability (CVE-2026-20700) in dyld, the dynamic linker, which is a memory corruption issue. This flaw allows attackers with memory write capabilities to potentially execute arbitrary code on affected devices. Google’s Threat Analysis Group discovered the vulnerability and confirmed it was exploited in extremely sophisticated, targeted attacks against specific individuals. The DarkSword exploit kit has been observed leveraging this vulnerability, along with others, to gain full control of compromised devices. The vulnerability has existed in every iOS version since its inception. Exploitation may involve sophisticated techniques, potentially including the use of phishing and chained vulnerabilities. While the initial reports suggest targeted attacks, the potential for broader exploitation exists once the details become publicly available.
Recommendations
Update to iOS 26.3 or later.
Update to iPadOS 26.3 or later.
Update to macOS Tahoe 26.3 or later.
Update to watchOS 26.3 or later.
Update to tvOS 26.3 or later.
Update to visionOS 26.3 or later.
Fix
RCE
LPE
DoS
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Apple Macos
Dyld
Ios
Ipados
Tvos
Visionos
Watchos