iOS 26 Beta: Security Challenges and Technical Analysis
Introduction: iOS 26 in March 2026
iOS 26, released on September 15, 2025, revolutionized the user experience with Liquid Glass and Apple Intelligence. But in March 2026, the attack surface remains a major concern for security experts. Each new feature mechanically expands the system's attack surface [1].
| Feature | Security Risk | Potential Impact |
|---|---|---|
| Apple Intelligence | Context leaks · Prompt injection | Transmission of sensitive data |
| Liquid Glass (Metal) | Increased GPU surface | Higher rendering complexity |
| TestFlight | Malware distribution | Bypass App Store validation |
| CarPlay | Network reconnection bugs | Potential man-in-the-middle attacks |
Note: No official public data from Apple precisely quantifies the rate of security incidents on beta versus stable versions. Caution is advised: use a dedicated device for beta testing.
Security Timeline
iOS 18.3.1: Emergency patch for CVE-2025-24200 (USB Restricted Mode bypass, physical access). Zero-day actively exploited, discovered by Citizen Lab.
iOS 18.3.2: Patch for CVE-2025-24201 (WebKit out-of-bounds write, sandbox escape). WebKit zero-day exploited before iOS 17.2.
WWDC 2025: Official announcement of iOS 26, Liquid Glass and expanded Apple Intelligence. Developer beta opens.
Public release: iOS 26 and iPadOS 26, with over 40 integrated security fixes.
iOS 26.1: Multiple fixes (Apple Neural Engine, WebKit, Photos). Added opacity toggle for Liquid Glass.
iOS 26.2: Critical patch for CVE-2025-43529 and CVE-2025-14174 (WebKit, exploited spyware zero-days, discovered by Google TAG). Fix for CVE-2025-46285 (kernel, root privilege escalation).
Adoption: ~16% of active iPhones on iOS 26, of which 4.6% on iOS 26.2. Apple accelerates migration notifications. Active testing of Background Security Improvements in iOS 26.3.
iOS 26.4 beta: End-to-end RCS encryption, Stolen Device Protection enabled by default, strengthened Memory Integrity Enforcement.
Apple Intelligence: AI Security
On-device processing minimizes leaks, but Prompt Injection attacks attempt to bypass Siri's instructions to perform unauthorized actions. An independent security analysis published in June 2025 by CyCraft tested Apple's on-device model.
🔬 Red team results (CyCraft, June 2025): Out of 196 injection attempts, Apple's on-device model blocked 70.4% of attacks, outperforming several comparable models like Llama-3.2 (55.1%) and GPT-4.1-nano (69.5%). However, 26% of optimized prompts produced technically detailed responses potentially exploitable.
| Attack Vector | Description | Consequence |
|---|---|---|
| Context leak | Siri/ChatGPT requests transmitting sensitive data | Exposure of private information |
| Malicious prioritization | Mail AI may highlight phishing emails | Increased phishing attacks |
| Prompt injection | Message triggering an action without user consent | Fraudulent system actions |
⚠️ Reminder: The EAL6+ certification of Apple Secure Enclave chips does not protect against prompt injection attacks. These vulnerabilities exploit weaknesses in language models, not cryptographic hardware.
Liquid Glass & Hardware Risks
The Liquid Glass design multiplies transparency effects and GPU animations via Apple's Metal engine. This graphical sophistication increases rendering complexity.
❌ Correction — iLeakage is NOT linked to Liquid Glass: iLeakage (disclosed in October 2023, ACM CCS) is a speculative execution attack targeting Apple Silicon CPUs via Safari's JavaScript engine, with no connection to the Liquid Glass design or GPU rendering effects.
✅ No published CVE vulnerability to date explicitly ties Liquid Glass to data extraction via GPU side channels.
⚠️ Persistent hardware threats: SLAP and FLOP (January 2025)
In January 2025, researchers unveiled two new side-channel attacks, SLAP and FLOP, directly targeting Apple Silicon processors. These hardware vulnerabilities remain relevant and affect all iOS versions, including iOS 26 [18].
| Attack | Affected Processors | Mechanism | Demonstrated Impact |
|---|---|---|---|
| SLAP | M2, A15 and later | Incorrect memory address prediction | Recovery of Gmail emails, Amazon data, Reddit activity |
| FLOP | M3, M4, A17 | Incorrect memory value prediction | Extraction of location history, calendar events, credit card info |
Apple's response: The company thanked the researchers but stated they do not consider these issues to pose "an immediate risk" to users. No complete fix has been deployed to date. Temporary mitigation: disable JavaScript in Safari.
Recent Vulnerabilities
The original descriptions of CVE-2025-24200 and CVE-2025-24201 were incorrect. Below are the official data consistent with Apple and NIST bulletins.
CVE-2025-24200 ✓ Patched iOS 18.3.1
Component: USB Restricted Mode (Accessibility) – Type: Authorization bypass (CWE-285)
Vector: Physical access required – no network involved
Impact: Disabling USB Restricted Mode on a locked device
Patch: iOS 18.3.1 / iPadOS 18.3.1 – February 10, 2025
Discovery: Bill Marczak (The Citizen Lab, Univ. Toronto)
CVE-2025-24201 ✓ Patched iOS 18.3.2
Component: WebKit (Safari engine) – Type: Out-of-bounds write (CWE-787)
Vector: Malicious web content – no Bluetooth involved
Impact: Sandbox escape (code execution)
Patch: iOS 18.3.2 / iPadOS 18.3.2 / macOS 15.3.2 – March 12, 2025
Context: Additional fix for a vector blocked since iOS 17.2.
✅ Status in iOS 26: These two vulnerabilities were fixed several months before the public launch of iOS 26 (September 2025). Any device up-to-date since March 2025 was already protected.
Real vulnerabilities that appeared in iOS 26 (post-release)
Since the public release of iOS 26 in September 2025, Apple has fixed actively exploited vulnerabilities, notably in iOS 26.2 (December 12, 2025):
| CVE | Component | Impact | Discovery |
|---|---|---|---|
| CVE-2025-43529 | WebKit (Use-After-Free) | Arbitrary code execution | Google Threat Analysis Group |
| CVE-2025-14174 | WebKit (memory corruption) | Arbitrary code execution | Apple + Google TAG |
| CVE-2025-46285 | Kernel | Root privilege escalation | Apple Security |
Both WebKit flaws were actively exploited in "extremely sophisticated" mercenary spyware attacks. CVE-2025-14174 also affected Google Chrome (via the ANGLE component).
📊 iOS 26 adoption — A major risk factor
As of January 2026, only 16% of active iPhones were running an iOS 26 version, of which barely 4.6% on iOS 26.2 (the version containing critical fixes). Resistance to the Liquid Glass design explains this unusually slow adoption. Consequence: the vast majority of users (about 80%) remain on iOS 18, exposed to a growing stock of unpatched flaws and without the enhanced memory protections (Memory Integrity Enforcement) exclusive to iOS 26.
Privacy and Dependencies
The integration of Apple Intelligence with third-party services like ChatGPT (OpenAI) introduces outbound data flows that deserve attention. Apple has implemented a Private Cloud Compute architecture for delegated AI requests, but the shared data surface remains to be monitored.
🔑 Third-party software dependencies: iOS beta apps often integrate preliminary framework versions. It is recommended to regularly audit published CVEs for third-party SDKs used in apps installed via TestFlight (especially AI and networking frameworks).
SafeITExperts Recommendations
To ensure the integrity of your professional data under iOS 26:
- Dedicated device: Never install the beta on your primary device. Use a secondary iPhone reserved for testing.
- Two-factor authentication: Enable two-factor authentication on your Apple ID — essential at all times.
- Check TestFlight: Carefully verify the source of every TestFlight invitation before installing an app.
- Monitor Apple Pay: Enable transaction notifications and regularly check your statements.
- Update promptly: Apply every security update as soon as it's available — WebKit zero-days are regularly exploited.
- Lockdown Mode: For high-risk profiles, enable Apple's Lockdown Mode.
| Action | Security Impact | Complexity |
|---|---|---|
| Stable vs Beta | High (80% protection) | Low |
| Auto Update | High (Zero-day) | Low |
| Dependency Audit | Medium (Third-party) | High |
Conclusion: A Fragmented Security Landscape
iOS 26 embodies Apple's quest for a unified and intelligent mobile experience, but early adoption via the beta exposed users to increased risks. Since its public release, the security cycle has been active: three major updates in four months, two WebKit zero-days exploited in mercenary spyware attacks.
🔮 The good news: Updating to iOS 26.2 or later fixes all known vulnerabilities and adds unprecedented memory protections.
🔮 The bad news: With only 16% of compatible devices on iOS 26 and 4.6% on iOS 26.2 as of January 2026, the vast majority of users remain exposed to a growing stock of unpatched flaws.
⚠️ The new challenge: Hardware attacks like SLAP and FLOP remind us that some vulnerabilities persist at the silicon level and cannot be fully corrected by software alone.
« Absolute security does not exist — only a dynamic balance between features and risks. The quality of an analysis lies in the accuracy of its sources. » — SafeITExperts
Technical Glossary
Apple Intelligence
AI system integrated into iOS 26 combining on-device models and secure cloud queries (Private Cloud Compute).
Liquid Glass
New iOS 26 design language using advanced transparency, blur, and GPU animation effects via Metal.
Prompt Injection
Attack technique exploiting AI models by providing malicious inputs to bypass system directives.
iLeakage / SLAP / FLOP
Speculative execution attacks targeting Apple Silicon CPUs via the JavaScript engine, allowing sensitive data leaks.
USB Restricted Mode
iOS feature blocking USB data connections if the device has been locked for more than one hour.
Memory Integrity Enforcement
Memory protection mechanism introduced in iOS 26, absent from iOS 18, enhancing resistance to memory corruption attacks.
Background Security Improvements
New system for background security updates without a full reboot, tested since iOS 26.3.
Sources and References
📱 Official Apple Sources
- Apple Security — iOS 18.3.1 Security Bulletin (CVE-2025-24200) — February 2025
- Apple Security — iOS 18.3.2 Security Bulletin (CVE-2025-24201) — March 2025
- Apple Security — iOS 26 and iPadOS 26 Security Bulletin — September 2025
- Apple Security — iOS 26.2 Security Bulletin — December 2025
🔐 Vulnerability Databases
- NIST National Vulnerability Database — NVD CVE-2025-24200
- NIST National Vulnerability Database — NVD CVE-2025-24201
- CISA Known Exploited Vulnerabilities Catalog — CVE-2025-43529, CVE-2025-14174 — December 2025
🛡️ Technical Analyses and Security Research
- Quarkslab — Technical analysis of CVE-2025-24200 (USB Restricted Mode bypass) — February 2025
- Field Effect — CVE-2025-24201 WebKit Zero-Day Analysis — March 2025
- CyCraft — Security analysis of Apple's on-device Apple Intelligence model — June 2025
- Georgia Institute of Technology & Ruhr University Bochum — SLAP and FLOP attacks on Apple Silicon (ACM CCS 2023/2025)
- AdwaitX — iOS 26.2: Details of CVE-2025-43529 and CVE-2025-14174 — December 2025
- GBHackers — iOS 26.1 Security Update Analysis — November 2025
- Bitdefender — iOS 26.2 — WebKit flaws exploited in targeted attacks — December 2025
- SOCRadar — CVE-2025-43529 & CVE-2025-14174: Apple and Google's Zero-Day Patches — December 2025
- Security Affairs — Apple fixed first actively exploited zero-day in 2026 (CVE-2026-20700) — February 2026
📊 Adoption Data and Statistics
- 9to5Mac — Are people updating to iOS 26? Here's Apple's official data — February 2026
- The Mac Observer — Apple Confirms Two-Thirds of iPhones Now Use iOS 26 — February 2026
- Malwarebytes — Why iPhone users should update and restart their devices now — January 2026
🆕 iOS 26.3 and 26.4 New Features
- CNET — You Can Download iOS 26.4 Developer Beta 3 on Your iPhone Right Now — March 2026
- 9to5Mac — Apple releases iOS 26.3 security test for beta users — January 2026
- The Mac Observer — Apple tests Background Security Improvements with iOS 26.3 (a) update — January 2026
- iClarified — Apple Releases iOS 26.4 Beta 3 and iPadOS 26.4 Beta 3 to Developers — March 2026
🎯 Additional Analyses
- BleepingComputer — New Apple CPU side-channel attacks steal data from browsers (SLAP/FLOP) — January 2025
- Anti-Malware.ru — FLOP и SLAP: вектор атаки по сторонним каналам затрагивает процессоры Apple — January 2025 (in English)
Total: 22 sources
/image%2F7127247%2F20260308%2Fob_2314ed_9662447e-3cc6-486e-bf1f-999cb332b3db.png)
We Value Your Feedback
Have you noticed other vulnerabilities or security changes on iOS 26? Share your experience in the comments or on social media with the hashtag #SafeITExperts.