Changeflow GovPing Data Privacy & Cybersecurity Apple Products Multiple Vulnerabilities
Priority review Notice Added Final

Apple Products Multiple Vulnerabilities

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published
Detected
Email

Summary

CERT-FR has issued a security advisory regarding multiple vulnerabilities discovered in various Apple products, including iOS, iPadOS, macOS, and Safari. These vulnerabilities could allow attackers to elevate privileges, cause remote denial-of-service, and compromise data confidentiality.

Published by CERT-FR on cert.ssi.gouv.fr . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-FR, the French national cybersecurity agency, has issued an advisory (CERTFR-2026-AVI-0355) detailing multiple vulnerabilities found in various Apple products. The advisory highlights risks including data integrity and confidentiality breaches, security policy bypass, remote denial-of-service, and privilege escalation. Affected systems include specific versions of iOS, iPadOS, macOS, Safari, tvOS, visionOS, and watchOS, with versions prior to 26.4 or specific build numbers being vulnerable.

Users and organizations are advised to refer to Apple's security bulletins for the necessary patches. The advisory lists multiple CVE references and Apple's support article numbers, emphasizing the need for prompt updates to mitigate these security risks. Failure to apply these patches could expose systems to remote attacks, leading to significant data compromise and operational disruption.

What to do next

  1. Apply security updates for affected Apple products as per Apple's advisories.
  2. Review and update security policies to account for identified vulnerabilities.
  3. Monitor for further advisories from CERT-FR and Apple regarding these vulnerabilities.

Archived snapshot

Mar 25, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 25 mars 2026 N° CERTFR-2026-AVI-0355 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Multiples vulnérabilités dans les produits Apple

Gestion du document

| Référence | CERTFR-2026-AVI-0355 |
| Titre | Multiples vulnérabilités dans les produits Apple |
| Date de la première version | 25 mars 2026 |
| Date de la dernière version | 25 mars 2026 |
| Source(s) | Bulletin de sécurité Apple 126792 du 24 mars 2026
Bulletin de sécurité Apple 126793 du 24 mars 2026
Bulletin de sécurité Apple 126794 du 24 mars 2026
Bulletin de sécurité Apple 126795 du 24 mars 2026
Bulletin de sécurité Apple 126796 du 24 mars 2026
Bulletin de sécurité Apple 126797 du 24 mars 2026
Bulletin de sécurité Apple 126798 du 24 mars 2026
Bulletin de sécurité Apple 126799 du 24 mars 2026
Bulletin de sécurité Apple 126800 du 24 mars 2026
Bulletin de sécurité Apple 126801 du 24 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Atteinte à l'intégrité des données
  • Atteinte à la confidentialité des données
  • Contournement de la politique de sécurité
  • Déni de service à distance
  • Injection de code indirecte à distance (XSS)
  • Élévation de privilèges

Systèmes affectés

  • iOS versions antérieures à 18.7.7
  • iOS versions antérieures à 26.4
  • iPadOS versions antérieures à 18.7.7
  • iPadOS versions antérieures à 26.4
  • macOS Sequoia versions antérieures à 15.7.5
  • macOS Sonoma versions antérieures à 14.8.5
  • macOS Tahoe versions antérieures à 26.4
  • Safari versions antérieures à 26.4
  • tvOS versions antérieures à 26.4
  • visionOS versions antérieures à 26.4
  • watchOS versions antérieures à 26.4
  • Xcode versions antérieures à 26.4

Résumé

De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 25 mars 2026 Version initiale

Named provisions

Risques Systèmes affectés Résumé Solutions Documentation

Get daily alerts for CERT-FR Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-FR.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-FR
Published
March 25th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CERTFR-2026-AVI-0355

Who this affects

Applies to
Consumers Employers Technology companies
Industry sector
3341 Computer & Electronics Manufacturing 5112 Software & Technology
Activity scope
Vulnerability Management System Patching
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Vulnerability Management Information Security

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!