Mondoo

Only 18% Have Updated iOS Despite Active Exploits

Apple has released security patches for two actively exploited WebKit vulnerabilities affecting iPhones, Macs, and iPads. Despite the availability of iOS 26.2, which addresses these flaws, data shows that 82% of iOS systems remain vulnerable because users haven't upgraded.

Dominik RichterDeborah Galea
Dominik Richter, Deborah Galea
·3 min read·
Only 18% Have Updated iOS Despite Active Exploits

Apple addressed two critical WebKit vulnerabilities (CVE-2025-14174 and CVE-2025-43529) that attackers are actively exploiting as zero-day flaws. Both CVEs have been added to the CISA Known Exploited Vulnerabilities Catalog. These issues can cause memory corruption and permit arbitrary code execution, making immediate updates essential.

Mondoo Platform reports that the vast majority of iOS devices—82% of all systems—are running versions prior to 26.2. Most devices (68%) operate on iOS 26.0 or 26.1 but haven't progressed to the patched version. Organizations should deploy updates through centralized endpoint management immediately.

What is CVE-2025-14174?

This high-severity memory corruption flaw affects the ANGLE graphics layer in web engines, including Google Chrome on macOS and Apple's WebKit. Out-of-bounds memory access triggered by malicious HTML allows remote attackers to corrupt memory and execute arbitrary code simply by directing users to hostile webpages. The vulnerability was added to the CISA Known Exploited Vulnerabilities catalog.

What is CVE-2025-43529?

A critical use-after-free bug in Apple's WebKit browser engine enables arbitrary code execution when processing maliciously crafted web content. The flaw impacts iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and Safari. It was actively exploited in targeted attacks before Apple issued emergency updates including iOS 26.2, macOS Sequoia 15.7.3, and macOS Sonoma 14.8.3.

Who is Affected?

These CVEs target users of Apple devices (iPhone, iPad, Mac, Apple TV, Vision Pro) running older software. The WebKit browser engine vulnerability leads to potential memory corruption and remote code execution through malicious websites.

How Mondoo Helps

Mondoo scans entire IT infrastructures—endpoints, cloud, and on-premises systems—to alert organizations when Apple systems are vulnerable and require updating. The platform detects critical CVEs and identifies systems needing patches.

About the Authors

Dominik Richter

Dominik Richter

Co-Founder & CPO

Dom is a founder, coder, and hacker and one of the creators of Mondoo. He helped shape the DevOps and security space with projects like Chef InSpec and Dev-Sec.io. Dom worked in security and automation at companies like Google, Chef, and Deutsche Telekom. Beyond his work, he loves to dive deep into hacker and nerd culture, science and the mind, and making colorful pasta from scratch.

Deborah Galea

Deborah Galea

Director of Product Marketing

Deborah is Director of Product Marketing at Mondoo and leads messaging and positioning, product launches, and sales enablement. She has 20+ years of experience in the cybersecurity industry. Prior to Mondoo, Deborah was Director of Product Marketing at Orca Security and held various marketing positions at other cybersecurity companies. She co-founded email security company Red Earth Software, which was acquired by cybersecurity firm OPSWAT in 2014.

Ready to Get Started?

See how Mondoo can help secure your infrastructure.