Apple Now Sending Critical Security Alerts to iPhones Running iOS 17 and Earlier

Apple has started sending system-level Lock Screen warnings to some iPhones and iPads running older versions of iOS and iPadOS, alerting users that they may be exposed to active, real-world web-based attacks.

These alerts are part of Apple’s security notification system, which is used when the company detects that a user may be individually targeted by sophisticated spyware or exploit activity, often involving malicious web content or zero-day vulnerabilities.

In these warnings, Apple typically urges users to:

  • Update to the latest available iOS/iPadOS version immediately

  • Enable stronger protections such as Lockdown Mode (for high-risk users)

  • Avoid interacting with suspicious links or web content

The timing matters here: older iOS versions often miss the latest security patches, which means known vulnerabilities can remain exploitable until the device is updated.

Apple has used similar notifications in the past as part of its broader “threat intelligence” approach, where it proactively warns users it believes may be targeted by advanced spyware campaigns, rather than waiting for widespread infection.

If you want, tell me your iOS version and I can check what security updates or risks might apply to it.

What you’re describing is essentially Apple’s expanded security alert system being used at a broader scale than usual, targeting users on older, vulnerable iOS builds.

Here’s the key takeaway in plain terms:

What these alerts mean

Apple is warning some users that:

  • Their device is running out-of-date iOS software

  • There is active exploitation in the wild (not just theoretical bugs)

  • Attackers are using malicious websites or links to try to compromise devices

The notification labeled as “Critical Software” is designed to stand out because Apple treats this as a high-severity risk, similar to its known threat notifications used in targeted spyware campaigns.


Why older versions are being flagged

The mention of exploit kits like “Coruna” and “DarkSword” (as reported) suggests attackers are actively chaining known vulnerabilities across multiple iOS generations, including:

  • iOS 13 → iOS 17.2.1 (and possibly earlier unpatched variants)

That matters because even a single outdated component (like WebKit or image parsing) can be enough for a “drive-by” compromise if a user visits a malicious page.


What Apple is doing in response

Apple has been addressing these issues through security-only updates for older iOS branches, such as:

  • iOS 15.8.7

  • iOS 16.7.15

These don’t add features—they patch known security holes that are still being actively exploited.

At the same time:

  • iOS 15 and newer patched devices are considered protected

  • Older unsupported devices are encouraged to upgrade to the highest supported iOS version


Why you might be seeing this now

The interesting part is that Apple is reportedly showing these warnings even on:

  • iOS 17.0 devices (which are not extremely old)

That suggests either:

  • A new wave of active exploitation, or

  • Apple tightening thresholds for “high-risk outdated” classification


What users should actually do

The guidance is simple but important:

  • Update iOS immediately (Settings → General → Software Update)

  • If stuck on older hardware, install the latest supported security update

  • Enable Lockdown Mode if you’re in a high-risk category (journalists, activists, etc.)


Bottom line

This isn’t a general “your phone is old” warning—it’s Apple reacting to real, ongoing web-based attack activity targeting unpatched devices, and pushing users to close the security gap quickly.

If you want, I can break down what Lockdown Mode actually blocks in practice or explain how these “web-based zero-click” style attacks typically work.