Key Highlights
- Other security patches address bugs in Photos, VoiceOver, and Screenshots, to name a few.
- iOS 26.3 patches a zero-day affecting dyldAccording to Apple's latest security bulletin, the zero-day—tracked as CVE-2026-20700—is a memory corruption issue in dyld, Apple's "Dynamic Link Editor." The flaw could allow attackers with memory write capability to execute arbitrary code—or, in other words, run their own code on your device. Apple says that the vulnerability may have been exploited in an "extremely sophisticated attack against specific targeted individuals" in earlier versions of iOS alongside CVE-2025-14174 and CVE-2025-43529.
- Those at greatest risk with this bug are likely high-profile users with access to sensitive data—users who might be inclined to use Apple's Lockdown Mode—but everyone should install the update to patch the issue.
- You May Also Like The patch for this flaw is available for the following iOS and iPadOS devices, in addition to all Macs that run macOS Tahoe: What do you think so far?
- iPhone 11 and lateriPad Pro 12.9-inch 3rd generation and lateriPad Pro 11-inch 1st generation and lateriPad Air 3rd generation and lateriPad 8th generation and lateriPad mini 5th generation and laterHow to install the latest security update for iPhoneYou should have automatic updates enabled to ensure you receive critical security patches ASAP, but you can confirm that you're on the latest OS version under Settings > General > Software Update.


