The Forever Day: How an 18-Year-Old iOS Bug Became Spyware Gold

CVE-2026-20700 has been silently waiting in every iPhone since 2007. Commercial spyware vendors found it first.

The Clock That Never Stopped

Picture this: The year is 2007. Steve Jobs walks onto a stage in San Francisco and introduces a revolutionary device that will change the world. “An iPod, a phone, and an internet communicator,” he says, revealing the first iPhone. The crowd erupts.

But hidden in the millions of lines of code powering that revolutionary device was a flaw. A tiny crack in the foundation. A vulnerability that would remain invisible, untouched, and unfixed for the next 18 years and 8 months.

On February 11, 2026, Apple quietly released iOS 26.3. Buried in the security notes was a single line that would send shockwaves through the security community:

“A memory corruption issue was addressed with improved state management.”

The vulnerability, designated CVE-2026-20700, had been present in every single version of iOS ever released—from iOS 1.0 on the original iPhone to iOS 26.2 on the latest iPhone 17 Pro Max. It affected iPadOS, macOS, watchOS, tvOS, and even visionOS.

But here’s the kicker: Apple wasn’t the one who found it.

Google’s Threat Analysis Group—the elite security team that hunts government hackers and commercial spyware vendors—discovered the flaw while tracking an “extremely sophisticated attack against specific targeted individuals.”

In the shadowy world of zero-day vulnerabilities, that phrase is industry shorthand for one thing: spyware.

What Is a “Forever Day”?

In cybersecurity, we talk about “zero-days”—vulnerabilities that are exploited before developers have zero days to fix them. But CVE-2026-20700 deserves its own category. Security researchers are calling it a “forever day”—a vulnerability so old, so fundamental to the system, that it has been hiding in plain sight for nearly two decades.

During those 18 years, this flaw survived:

  • 26 major iOS versions
  • Thousands of security updates
  • Multiple complete architecture changes
  • The transition to 64-bit
  • Introduction of ASLR, stack canaries, and PAC
  • Apple’s enhanced security reviews post-Pegasus scandals
  • Bug bounty payouts totaling over $35 million to researchers

And yet, the bug remained. Waiting. Until someone found it.

Inside dyld: Apple’s Achilles Heel

dyld stands for Dynamic Link Editor. It’s one of the most fundamental components of any Apple operating system. Every single time you launch an app—whether it’s Safari, Instagram, your banking app, or a game—dyld runs first.

As Brian Milbier, deputy CISO at Huntress, explained:

“Think of dyld as the doorman for your phone. Every single app that wants to run must first pass through this doorman. This vulnerability allows an attacker to trick the doorman into handing over a master key before security checks even begin.”

dyld runs with extremely high privileges, before most security protections are applied. A vulnerability here isn’t just a hole in the wall—it’s a skeleton key to the entire building.

The Exploit Chain: Three Vulnerabilities, Total Compromise

CVE-2026-20700 wasn’t exploited in isolation. Google TAG’s investigation revealed that the attackers used three vulnerabilities in sequence:

CVECVSSComponentType
CVE-2025-141748.8ANGLE (Metal renderer)Out-of-bounds memory access
CVE-2025-435298.8WebKitUse-after-free
CVE-2026-207007.8dyldMemory corruption

Stage 1: Initial Access via WebKit—triggered by simply visiting a malicious webpage or receiving a specially crafted iMessage. Zero-click.

Stage 2: The attacker targets dyld, corrupting its state to load malicious code before security checks.

Stage 3: Full device control—read all files, access keychain, monitor traffic, activate microphone/camera, track location, read encrypted messages.

The Million-Dollar Market

Understanding why CVE-2026-20700 becomes “spyware gold” requires understanding the economics:

Apple’s Bug Bounty: Up to $2-5 million for a zero-click kernel exploit.

Gray Market (Zerodium): iOS full chain zero-click = $2.5 million+

Commercial Spyware License (Pegasus): $500,000 to $50 million per contract.

For a zero-click iOS chain that works from iOS 1.0 through iOS 26.2? The price would be astronomical—potentially $5-10 million or more.

Are You Compromised?

The terrifying reality: victims usually don’t know they’re infected. There are no slow performance symptoms, no pop-ups, no obvious signs.

Use Amnesty International’s Mobile Verification Toolkit (MVT) for forensic analysis:

pip3 install mvt
mvt-ios check-backup --output /path/to/output /path/to/encrypted/backup

How to Protect Yourself Right Now

Update Immediately

DeviceUpdate To
iPhoneiOS 26.3
iPadiPadOS 26.3
MacmacOS Tahoe 26.3
Apple WatchwatchOS 26.3

CISA has added CVE-2026-20700 to its Known Exploited Vulnerabilities catalog with a mandatory remediation deadline of March 5, 2026 for federal agencies.

Enable Lockdown Mode (High-Risk Users)

Settings → Privacy & Security → Lockdown Mode → Turn On

Lockdown Mode significantly reduces your attack surface by blocking most message attachments, disabling link previews, blocking unknown FaceTime calls, and restricting web features.

Additional Steps

  • Enable Automatic Updates
  • Be skeptical of links from unknown senders
  • Use Signal for sensitive communications
  • Maintain encrypted backups

The Bottom Line

CVE-2026-20700 is a wake-up call. Somewhere in Apple’s codebase right now, other vulnerabilities are waiting. Some might be months old. Some might be decades old. Some might already be in the hands of spyware vendors.

Update your devices. Enable protections. Stay vigilant.


Quick Reference: CVE-2026-20700

AttributeValue
CVE IDCVE-2026-20700
CVSS Score7.8 (High)
Affected VersionsiOS 1.0 through iOS 26.2 (18+ years)
PatchiOS 26.3, iPadOS 26.3, macOS Tahoe 26.3
Discovered ByGoogle Threat Analysis Group
CISA KEVYes (deadline March 5, 2026)