BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Apple Patches iOS 15.8.7 for Legacy iPhone 6S Against Coruna Exploit

Apple Patches iOS 15.8.7 for Legacy iPhone 6S Against Coruna Exploit

March 12, 2026Vulnerabilities & Exploits2 min readmedium

Originally reported by Hacker News (filtered)

#apple#ios#legacy-devices#patch-management#mobile-security#coruna
Share

TL;DR

Apple issued iOS 15.8.7 to patch the Coruna exploit affecting iPhone 6S devices from 2015. The update demonstrates Apple's commitment to maintaining security patches for legacy hardware still in use.

Why medium?

While this addresses a confirmed exploit, it affects only legacy iPhone 6S devices from 2015 running iOS 15, representing a limited user base with reduced attack surface compared to current devices.

Legacy Device Security Update

Apple released iOS 15.8.7 specifically targeting iPhone 6S devices to address vulnerabilities related to the Coruna exploit. The update represents an unusual security maintenance effort for hardware originally released in September 2015, now over a decade old.

Coruna Exploit Details

While Apple's security advisory provides limited technical details about the Coruna exploit, the targeted nature of this patch suggests the vulnerability posed sufficient risk to warrant dedicated engineering resources for legacy device support. The iPhone 6S, despite its age, remains in active use among certain user populations who have not upgraded to newer hardware.

Implications for Legacy Device Management

This update highlights several key considerations for organizations managing mixed-age mobile device fleets:

  • Extended support timelines: Apple continues providing security patches for devices well beyond their commercial lifecycle
  • Attack surface persistence: Older devices remain viable targets for threat actors developing exploits
  • Patch deployment complexity: Organizations must maintain update processes for multiple iOS versions simultaneously

Technical Considerations

The iPhone 6S runs on Apple's A9 processor and lacks many hardware security features present in modern devices. This creates unique challenges when backporting security fixes from current iOS versions to legacy hardware architectures.

Security teams managing iPhone 6S devices should prioritize immediate deployment of iOS 15.8.7 and evaluate migration timelines for remaining legacy hardware in their environments.

Sources

  • https://support.apple.com/en-us/126632

Originally reported by Hacker News (filtered)

Tags

#apple#ios#legacy-devices#patch-management#mobile-security#coruna

Tracked Companies

🇺🇸Apple

Related Intelligence

  • Threat Roundup: AI Poisoning, Encrypted RCS, and Phishing TTPs

    mediumFeb 17, 2026
  • Chrome Extensions Go Rogue After Ownership Transfer: Weekly Security Roundup

    mediumMar 9, 2026
  • State Actors Unleash New Malware Arsenal as Phishing-as-a-Service Operations Scale Globally

    highMar 5, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Critical n8n RCE Hits KEV Catalog While Attackers Weaponize SOC Fatigue and Target Developers