Finished reading? Continue your journey in Tech with these hand-picked guides and tutorials.
Boost your workflow with our browser-based tools
Share your expertise with our readers. TrueSolvers accepts in-depth, independently researched articles on technology, AI, and software development from qualified contributors.
TrueSolvers is an independent technology publisher with a professional editorial team. Every article is independently researched, sourced from primary documentation, and cross-checked before publication.
Apple released iOS 26.2 on December 12, 2025, patching two actively exploited WebKit vulnerabilities and a critical kernel flaw. But here's what most security advisories won't tell you: the moment Apple published those patch details, your iPhone entered its most dangerous window if you haven't updated yet. Security research shows 12% of vulnerabilities get exploited within 24 hours of patch disclosure, and 56% within the first week. The first 48 hours represent peak risk for unpatched devices.

Most iOS security coverage focuses on what a patch fixes. Less attention goes to what a patch reveals, and to whom, in the hours before it arrives on your device.
The timeline for CVE-2025-14174, one of the two actively exploited WebKit vulnerabilities in iOS 26.2, illustrates this precisely. The flaw originates in ANGLE (Almost Native Graphics Layer Engine), an open-source graphics abstraction library used by both Google's Chrome browser engine and Apple's WebKit. Security researchers at Apple's SEAR team and Google's Threat Analysis Group identified the vulnerability and reported it to Google on December 5, 2025. Google patched it silently in Chrome on December 10, publishing only that the fix addressed a "high severity" issue without any CVE number or technical description. Microsoft Edge patched the same flaw on December 11. Apple's iOS 26.2 arrived December 12.
That sequence is not accidental. It is coordinated disclosure working exactly as intended: vendors patch in sequence, withholding technical details to limit attacker advantage during the rollout window. The system works. But it has an unavoidable side effect.
Any threat actor who monitors browser security releases professionally would have seen Google's December 10 Chrome advisory for a "high severity" ANGLE flaw and understood immediately that the same underlying library runs inside WebKit. Apple had not yet patched. The iPhone exposure window was visible, specific, and approximately 48 hours wide.
The "48-hour vulnerability window" is not a rhetorical construction. For CVE-2025-14174 specifically, it corresponds to a documented coordination gap between Chrome's December 10 fix and Apple's December 12 patch. Both Apple and CISA confirmed this vulnerability's severity on December 12. The moment Apple published its full security bulletin that same day, the technical roadmap for the remaining WebKit flaw became publicly accessible to anyone capable of reading a patch diff. This is the concrete mechanism the title describes.
iOS 26.2 patches 25 vulnerabilities in total. Three of them have a different character than the rest, and understanding why requires looking at how they fit together rather than treating each as an isolated issue.
The first is CVE-2025-43529, a use-after-free vulnerability in WebKit with a CVSS severity score of 9.8. Use-after-free flaws occur when a program continues accessing a block of memory after freeing it, creating conditions that allow attackers to execute arbitrary code. Google's Threat Analysis Group discovered this vulnerability, which is a reliable indicator of commercial surveillance vendor or nation-state involvement, as TAG's mandate focuses specifically on sophisticated threat actors. Processing a malicious webpage is the only trigger required: no download, no app installation, no user action beyond visiting a URL.
The second is CVE-2025-14174, the memory corruption flaw described above. Discovered jointly by Apple's SEAR team and Google TAG, this vulnerability allows attackers to corrupt device memory through crafted web content. Memory corruption exploits are frequently chained with code execution flaws to bypass security protections that would otherwise contain the initial compromise. Apple confirmed both vulnerabilities were exploited in "extremely sophisticated attacks against specific targeted individuals on versions of iOS before iOS 26," meaning working exploit chains existed in the wild before the patch was available.
The third is CVE-2025-46285, a kernel integer overflow. The kernel is the core component of iOS, the code layer that manages every other process and enforces the security boundaries between applications. An integer overflow in a time-related system function allowed apps to manipulate that function's behavior to gain root privileges. Apple fixed it by adopting 64-bit timestamps, eliminating the condition that made the overflow exploitable. Researchers at Alibaba Group discovered this flaw.
CVE-2025-43529 provides a foothold: an attacker's code visits a malicious site, the WebKit flaw executes their payload inside the browser sandbox. CVE-2025-14174 provides the memory corruption needed to break out of or bypass sandbox protections. CVE-2025-46285 provides the escalation to root. An attacker with access to working versions of the first two WebKit exploits plus the kernel flaw could theoretically chain a complete device takeover from a single webpage visit, with root-level access allowing them to read encrypted messages, capture authentication codes, hijack banking sessions, and install persistence tools that survive a reboot. Apple has not confirmed these specific vulnerabilities were chained together, but the combination of a browser entry point and a kernel escalation flaw is the standard architecture for sophisticated iOS attack chains.
iOS 26.2 brings Apple's confirmed zero-day count for 2025 to nine. For context, since 2023 Apple has disclosed 17 WebKit-specific zero-day vulnerabilities exploited in the wild, a pattern that reflects sustained targeting of the iOS browser surface by sophisticated threat actors throughout that period.
The detail that separates iOS from every other major platform in this context is architectural: Apple's App Store policy requires all iOS browsers to use WebKit as their rendering engine. Chrome on iOS is not the same application as Chrome on Windows. It is a WebKit wrapper with a Google interface. The same applies to Firefox, Edge, DuckDuckGo, Brave, and every other browser available through the App Store.
This means CVE-2025-43529 and CVE-2025-14174 are not Safari vulnerabilities. They are iOS vulnerabilities. Every browser on your iPhone shared the same exposure until December 12.
On Windows or Android, this is not how it works. Chrome ships its own engine, Blink. Firefox ships Gecko. A vulnerability in Chrome's Blink engine does not automatically expose Firefox users, and vice versa. Those browsers can push security updates independently without waiting for the operating system to ship a patch. An Android user running Chrome could have been protected from the ANGLE flaw the moment Google pushed the December 10 update. An iOS user running Chrome had no equivalent protection available until Apple shipped iOS 26.2.
The iOS WebKit architecture amplifies the blast radius of any single WebKit flaw beyond what a comparable vulnerability would mean on other platforms. There is no alternative browser to switch to while waiting for an Apple patch. The only mitigation available to an unpatched iOS user is avoiding all web browsing entirely, which is not a realistic operating posture. Once an attacker delivers a working WebKit exploit through a malicious website, a compromised advertisement, or a phishing link, no browser choice on iOS would have helped. The entire mobile browsing surface was exposed simultaneously.
The standard assumption about security patches is that they close a vulnerability. That is true, but only for users who have applied the patch. For everyone else, a patch release does the opposite: it converts a privately held vulnerability into a publicly documented one.
Apple's security bulletins are detailed and necessary. They describe what failed, which component was affected, how Apple addressed it, and who discovered the flaw. That documentation is what allows system administrators, security researchers, and analysts to verify that the right issue was fixed. It is also, for anyone with reverse engineering capability, a precise technical description of what to attack.
VulnCheck's analysis of the first half of 2025 found that 32.1% of Known Exploited Vulnerabilities had documented exploitation evidence on or before the day their CVE was publicly assigned, up from 23.6% in 2024. Nearly one in three actively exploited vulnerabilities was already being weaponized before defenders received formal notification it existed. For zero-days that were already exploited before patching, like the two WebKit flaws in iOS 26.2, the post-disclosure race becomes particularly acute.
Research tracking vulnerability exploitation timelines found the average time from patch disclosure to working exploit dropped from 32 days to 5 days in 2024, and that compression is accelerating. One specific mechanism driving it is AI-assisted development. A documented case study from April 2025 showed a security researcher moving from a publicly available patch diff to a working proof-of-concept exploit in under one day, with AI tools writing approximately 80% of the code. The AI handled code comparison between the vulnerable and patched versions, generated exploit primitive suggestions, and built the supporting infrastructure. What the demonstration showed was not just a speed improvement: it was a skill-floor reduction. The depth of expertise once required to reverse-engineer a memory corruption vulnerability from a patch diff is no longer the binding constraint.
The exploitation timeline that follows a major iOS zero-day patch now follows a consistent pattern. In the first 24 to 48 hours, the most capable actors, including those who may have already been exploiting the vulnerability, reverse-engineer the published patch to improve or adapt their existing tools. By days three through seven, proof-of-concept code begins circulating in security research channels and underground markets. Research published in the first half of 2025 found that between 50 and 61 percent of actively exploited vulnerabilities had weaponized exploit code available within 48 hours of public disclosure. By weeks two through four, working exploits are accessible to a much broader pool of attackers.
The same chip-level performance advances that define products like Apple's M5 MacBook Pro also power the AI tools that have compressed the exploit development timeline, a reminder that computing capability improvements cut in multiple directions.
32.1% of Known Exploited Vulnerabilities had documented exploitation evidence on or before the day their CVE was publicly assigned. The average time from patch disclosure to working exploit dropped to 5 days in 2024. Documented AI-enabled proof-of-concept development has compressed that further, to under one day in at least one documented case. For actively exploited zero-days in high-value targets like WebKit, the traditional assumption that you have days or weeks to apply a security patch before meaningful exploitation risk accumulates is no longer accurate. Individual users who delay updates are no longer in a safer window. They are inside it.
Apple described the iOS 26.2 WebKit exploits as deployed in "extremely sophisticated attacks against specific targeted individuals." That phrasing is accurate for the exploits' initial use. It is not a permanent description of who gets targeted.
The mechanics of high-end iOS exploit development make the initial targeting specificity inevitable. Building a reliable WebKit exploit chain requires bypassing Pointer Authentication Codes, circumventing Control Flow Integrity protections, and achieving precise memory corruption, all in sequence. These capabilities require substantial expertise and resources, which is why such tools are initially deployed against high-value targets where the investment is justified: journalists, dissidents, political figures, corporate executives. The cost per target can reach hundreds of thousands of dollars.
But exploit code does not stay exclusive.
Google's Threat Intelligence Group published its Coruna research in March 2026, documenting the lifecycle of a sophisticated iOS exploit kit containing 23 exploits across five full attack chains. GTIG first observed elements of the kit in February 2025 in use by a customer of an unnamed commercial surveillance vendor, deployed against specific individuals. By summer 2025, the same JavaScript framework appeared in watering-hole attacks on Ukrainian websites run by UNC6353, a suspected Russian espionage group. By late 2025, the complete kit was deployed by UNC6691, a financially motivated Chinese criminal group, on fake financial and cryptocurrency websites with no geolocation filtering. Any vulnerable iPhone visiting those sites was at risk. The payload targeted 18 cryptocurrency wallet applications. The kit had gone from selective surveillance tool to indiscriminate mass exploitation within ten months.
The Coruna case demonstrates that the pipeline from commercial spyware capability to mass criminal deployment is not theoretical. It operates on a timeline measured in months, not years, and it does not discriminate by target once criminal actors acquire the tools. While we cannot confirm the specific exploit chains behind the iOS 26.2 CVEs will follow the same trajectory, the late-2025 UNC6691 deployment required no targeting intelligence at all. It simply waited for unpatched iPhones to arrive.
Coruna, notably, did not execute against iPhones running in Lockdown Mode. That is worth remembering for users who are high-risk targets. For everyone else, the protective action is the same: the update closes the vulnerability that makes the kit effective.
The update takes approximately 10 to 15 minutes on a reliable connection. Here is how to apply it and verify the result.
First, connect to WiFi and plug in your device or ensure the battery is above 50 percent. iOS requires a wireless connection for updates and will not install on low battery without power connected.
Second, open Settings, tap General, then Software Update. Your iPhone will check for available updates. If you are running iOS 26, you should see iOS 26.2. If you are running iOS 18 on an iPhone XS, XR, or first-generation iPhone SE 2, you should see iOS 18.7.3, which contains the same WebKit and kernel patches.
Third, tap Download and Install. The update will download first and then install, requiring a restart. Do not interrupt the process once installation begins.
Fourth, after the restart, go to Settings, tap General, then About. Confirm the Software Version line shows 26.2 or 18.7.3 with its build number.
If your device is running iOS 26.1 with Background Security Improvements enabled, you may have received partial protection against these specific vulnerabilities through Apple's Rapid Security Response system before the full iOS 26.2 release. Updating to iOS 26.2 regardless ensures complete coverage across all 25 patched components.
The minimum acceptable action for any iPhone XS or newer is applying the December 12 patch through whichever iOS version your device supports. The core vulnerability coverage for the three CVEs discussed here is present in both update paths. iOS 26 includes additional security capabilities not available in iOS 18.7.3, including enhanced anti-scam protections and expanded emergency alert features, but that distinction is secondary. Updating to iOS 18.7.3 closes the window. Updating to iOS 26.2 closes it and adds additional protections.
Do not wait to apply this update. The vulnerabilities Apple patched were already being used in active attacks before December 12. The exploitation window for unpatched devices opened the moment the security bulletin published the details. Every day between patch availability and the moment you update is time spent inside a window that research shows closes quickly but never starts wide.
Does using Chrome or Firefox on my iPhone protect me from WebKit vulnerabilities?
No. All browsers on iOS, including Chrome, Firefox, and Edge, are required by Apple's App Store policy to use WebKit as their rendering engine. This means a WebKit vulnerability affects every browser on your device simultaneously. There is no iOS browser that uses a different engine and would be unaffected.
If I only visit trusted websites, am I safe?
Not reliably. Malvertising campaigns can inject malicious code into advertisements that appear on legitimate, trusted websites without the site operator's knowledge. Watering-hole attacks, which is the method used in the Coruna deployment against Ukrainian news sites, deliver exploits through legitimate-looking pages rather than obvious phishing sites. The protection is patching the underlying vulnerability, not restricting browsing behavior.
What is Lockdown Mode and should I enable it?
Lockdown Mode is an optional extreme hardening setting available in iOS 16 and later. It significantly restricts iOS functionality, including blocking most web fonts, disabling link previews, and limiting JavaScript in Safari. The Coruna exploit kit specifically checked for Lockdown Mode and did not execute against devices running it. For most users, the tradeoff in functionality is not warranted, and applying the iOS 26.2 update provides the necessary protection. For journalists, activists, executives, or others who may be targets of commercial surveillance tools, Lockdown Mode provides an additional, documented layer of defense worth considering.
Why did Google patch Chrome two days before Apple patched iOS?
The two patches address the same underlying flaw in ANGLE, a shared graphics library used by both Chrome's Blink engine and WebKit. Apple's SEAR team and Google's TAG jointly discovered the vulnerability and reported it to Google on December 5. Google patched Chrome on December 10. Microsoft Edge followed on December 11. Apple shipped iOS 26.2 on December 12. The staggered release reflects coordinated disclosure between the vendors, with each working through its own release process. The sequence was deliberate and, for the coordination window it created, unavoidable given how multi-vendor disclosure works.