対象デバイスは、iPhone 11以降, iPad(8代目), iPad mini(5代目以降), iPad Air(3代目), iPad Pro(12.9インチ 3代目以降、11インチ 初代以降)になります
Accessibility
CVE-2025-43442: Zhongcheng Li from IES Red Team of ByteDance
Apple Account
CVE-2025-43455: Ron Masas of BreakPoint.SH, Pinak Oza
Apple Neural Engine
CVE-2025-43447: an anonymous researcher
CVE-2025-43462: an anonymous researcher
Apple TV Remote
CVE-2025-43449: Rosyna Keller of Totally Not Malicious Software
AppleMobileFileIntegrity
CVE-2025-43379: Gergely Kalman (@gergely_kalman)
Assets
CVE-2025-43407: JZ
Audio
CVE-2025-43423: Duy Trần (@khanhduytran0)
Camera
CVE-2025-43450: Dennis Briner
CloudKit
CVE-2025-43448: Hikerell (Loadshine Lab)
Contacts
CVE-2025-43426: Wojciech Regula of SecuRing (wojciechregula.blog)
Control Center
CVE-2025-43350: Lukaah Marlowe
CoreServices
CVE-2025-43436: Zhongcheng Li from IES Red Team of ByteDance
CoreText
CVE-2025-43445: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative
FileProvider
CVE-2025-43498: pattern-f (@pattern_F_)
Find My
CVE-2025-43507: iisBuri
Installer
CVE-2025-43444: Zhongcheng Li from IES Red Team of ByteDance
Kernel
CVE-2025-43398: Cristian Dinca (icmd.tech)
libxpc
CVE-2025-43413: Dave G. and Alex Radocea of supernetworks.org
Mail Drafts
CVE-2025-43496: Romain Lebesle, Himanshu Bharti @Xpl0itme From Khatima
MallocStackLogging
CVE-2025-43294: Gergely Kalman (@gergely_kalman)
Model I/O
CVE-2025-43386: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative
CVE-2025-43385: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative
CVE-2025-43384: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative
CVE-2025-43383: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative
Multi-Touch
CVE-2025-43424: Google Threat Analysis Group
Notes
CVE-2025-43389: Kirin (@Pwnrin)
On-device Intelligence
CVE-2025-43439: Zhongcheng Li from IES Red Team of ByteDance
Photos
CVE-2025-43391: Asaf Cohen
Safari
CVE-2025-43493: @RenwaX23
CVE-2025-43503: @RenwaX23
CVE-2025-43502: an anonymous researcher
Sandbox Profiles
CVE-2025-43500: Stanislav Jelezoglo
Siri
CVE-2025-43454: Joshua Thomas
Status Bar
CVE-2025-43460: Isaiah Wan
Stolen Device Protection
CVE-2025-43422: Will Caine
Text Input
CVE-2025-43452: Thomas Salomon, Sufiyan Gouri (TU Darmstadt), Phil Scott (@MrPeriPeri) & Richard Hyunho Im (@richeeta), Mark Bowers, Joey Hewitt, Dylan Rollins, Arthur Baudoin, an anonymous researcher, Andr.Ess
WebKit
CVE-2025-43480: Aleksejs Popovs
CVE-2025-43458: Phil Beauvoir
CVE-2025-43430: Google Big Sleep
CVE-2025-43427: Gary Kwong, rheza (@ginggilBesel)
CVE-2025-43443: an anonymous researcher
CVE-2025-43441: rheza (@ginggilBesel)
CVE-2025-43435: Justin Cohen of Google
CVE-2025-43425: an anonymous researcher
CVE-2025-43440: Nan Wang (@eternalsakura13)
CVE-2025-43438: shandikri working with Trend Micro Zero Day Initiative
CVE-2025-43457: Gary Kwong, Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative
CVE-2025-43434: Google Big Sleep
CVE-2025-43495: Lehan Dilusha Jayasinghe
CVE-2025-43433: Google Big Sleep
CVE-2025-43431: Google Big Sleep
CVE-2025-43432: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative
CVE-2025-43429: Google Big Sleep
CVE-2025-43421: Nan Wang (@eternalsakura13)
WebKit Canvas
CVE-2025-43392: Tom Van Goethem
なおアップデートファイルの大きさは、iOS 26.0.1をインストールしているiPhone 11 proで3.37GB、iPhone 11で4.13GBになります