Update

Fixed: An app may be able to access sensitive user data

About the security content of watchOS 26

watchOS 26
Released September 15, 2025

Apple Neural Engine

  • Available for: Apple Watch Series 9 and later, Apple Watch SE 2nd generation, Apple Watch Ultra (all models)
  • Impact: An app may be able to cause unexpected system termination
  • Description: An out-of-bounds access issue was addressed with improved bounds checking.
  • CVE-2025-43344: an anonymous researcher

AppleMobileFileIntegrity

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to access sensitive user data
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2025-43317: Mickey Jin (@patch1t)

AudioBOLD

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory
  • Description: An out-of-bounds access issue was addressed with improved bounds checking.
  • CVE-2025-43346: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

Bluetooth

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to access sensitive user data
  • Description: A logging issue was addressed with improved data redaction.
  • CVE-2025-43354: Csaba Fitzl (@theevilbit) of Kandji
  • CVE-2025-43303: Csaba Fitzl (@theevilbit) of Kandji

CoreAudio

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing a maliciously crafted video file may lead to unexpected app termination
  • Description: An out-of-bounds write issue was addressed with improved input validation.
  • CVE-2025-43349: @zlluny working with Trend Micro Zero Day Initiative

CoreMedia
Available for: Apple Watch Series 6 and later
Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory
Description: The issue was addressed with improved input validation.
CVE-2025-43372: 이동하 (Lee Dong Ha) of SSA Lab

IOHIDFamily

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to cause unexpected system termination
  • Description: An out-of-bounds write issue was addressed with improved bounds checking.
  • CVE-2025-43302: Keisuke Hosoda

IOKit- Available for: Apple Watch Series 6 and later

  • Impact: An app may be able to access sensitive user data
  • Description: An authorization issue was addressed with improved state management.
  • CVE-2025-31255: Csaba Fitzl (@theevilbit) of Kandji

Kernel
Available for: Apple Watch Series 6 and later

Impact: A UDP server socket bound to a local interface may become bound to all interfaces
Description: A logic issue was addressed with improved state management.
CVE-2025-43359: Viktor Oreshkin

MobileStorageMounter

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to cause a denial-of-service
  • Description: A type confusion issue was addressed with improved memory handling.
  • CVE-2025-43355: Dawuge of Shuffle Team

Sandbox

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to break out of its sandbox
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2025-43329: an anonymous researcher

Spell Check

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to access sensitive user data
  • Description: A parsing issue in the handling of directory paths was addressed with improved path validation.
  • CVE-2025-43190: Noah Gregory (wts.dev)

SQLite

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing a file may lead to memory corruption
  • Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org.
  • CVE-2025-6965

System

  • Available for: Apple Watch Series 6 and later
  • Impact: An input validation issue was addressed
  • Description: This issue was addressed by removing the vulnerable code.
  • CVE-2025-43347: JZ, Seo Hyun-gyu (@wh1te4ever), Luke Roberts (@rookuu)

WebKit

  • Available for: Apple Watch Series 6 and later
  • Impact: A website may be able to access sensor information without user consent
  • Description: The issue was addressed with improved handling of caches.
  • WebKit Bugzilla: 296153
  • CVE-2025-43356: Jaydev Ahire

WebKit

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing maliciously crafted web content may lead to an unexpected Safari crash
  • Description: The issue was addressed with improved memory handling.
  • WebKit Bugzilla: 294550
  • CVE-2025-43272: Big Bear

WebKit

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing maliciously crafted web content may lead to an unexpected process crash
  • Description: The issue was addressed with improved memory handling.
  • WebKit Bugzilla: 296490
  • CVE-2025-43343: an anonymous researcher

WebKit

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing maliciously crafted web content may lead to an unexpected process crash
  • Description: A correctness issue was addressed with improved checks.
  • WebKit Bugzilla: 296042
  • CVE-2025-43342: an anonymous researcherwatchOS 26
  • Released September 15, 2025

Apple Neural Engine

  • Available for: Apple Watch Series 9 and later, Apple Watch SE 2nd generation, Apple Watch Ultra (all models)
  • Impact: An app may be able to cause unexpected system termination
  • Description: An out-of-bounds access issue was addressed with improved bounds checking.
  • CVE-2025-43344: an anonymous researcher

AppleMobileFileIntegrity

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to access sensitive user data
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2025-43317: Mickey Jin (@patch1t)

Audio

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory
  • Description: An out-of-bounds access issue was addressed with improved bounds checking.
  • CVE-2025-43346: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

Bluetooth

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to access sensitive user data
  • Description: A logging issue was addressed with improved data redaction.
  • CVE-2025-43354: Csaba Fitzl (@theevilbit) of Kandji
  • CVE-2025-43303: Csaba Fitzl (@theevilbit) of Kandji

CoreAudio

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing a maliciously crafted video file may lead to unexpected app termination
  • Description: An out-of-bounds write issue was addressed with improved input validation.
  • CVE-2025-43349: @zlluny working with Trend Micro Zero Day Initiative

CoreMedia

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory
  • Description: The issue was addressed with improved input validation.
  • CVE-2025-43372: 이동하 (Lee Dong Ha) of SSA Lab

IOHIDFamily

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to cause unexpected system termination
  • Description: An out-of-bounds write issue was addressed with improved bounds checking.
  • CVE-2025-43302: Keisuke Hosoda

IOKit

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to access sensitive user data
  • Description: An authorization issue was addressed with improved state management.
  • CVE-2025-31255: Csaba Fitzl (@theevilbit) of Kandji

Kernel

  • Available for: Apple Watch Series 6 and later
  • Impact: A UDP server socket bound to a local interface may become bound to all interfaces
  • Description: A logic issue was addressed with improved state management.
  • CVE-2025-43359: Viktor Oreshkin
    -
    MobileStorageMounter
  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to cause a denial-of-service
  • Description: A type confusion issue was addressed with improved memory handling.
  • CVE-2025-43355: Dawuge of Shuffle Team

Sandbox

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to break out of its sandbox
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2025-43329: an anonymous researcher

Spell Check

  • Available for: Apple Watch Series 6 and later
  • Impact: An app may be able to access sensitive user data
  • Description: A parsing issue in the handling of directory paths was addressed with improved path validation.
  • CVE-2025-43190: Noah Gregory (wts.dev)

SQLite

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing a file may lead to memory corruption
  • Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org.
  • CVE-2025-6965

System

  • Available for: Apple Watch Series 6 and later
  • Impact: An input validation issue was addressed
  • Description: This issue was addressed by removing the vulnerable code.
  • CVE-2025-43347: JZ, Seo Hyun-gyu (@wh1te4ever), Luke Roberts (@rookuu)

WebKit

  • Available for: Apple Watch Series 6 and later
  • Impact: A website may be able to access sensor information without user consent
  • Description: The issue was addressed with improved handling of caches.
  • WebKit Bugzilla: 296153
  • CVE-2025-43356: Jaydev Ahire

WebKit

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing maliciously crafted web content may lead to an unexpected Safari crash
  • Description: The issue was addressed with improved memory handling.
  • WebKit Bugzilla: 294550
  • CVE-2025-43272: Big Bear

WebKit

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing maliciously crafted web content may lead to an unexpected process crash
  • Description: The issue was addressed with improved memory handling.
  • WebKit Bugzilla: 296490
  • CVE-2025-43343: an anonymous researcher

WebKit

  • Available for: Apple Watch Series 6 and later
  • Impact: Processing maliciously crafted web content may lead to an unexpected process crash
  • Description: A correctness issue was addressed with improved checks.
  • WebKit Bugzilla: 296042
  • CVE-2025-43342: an anonymous researcher
Receive Important Update Messages Stay tuned for upcoming Apple updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad