Earlier iPhone models (click on your model to download iOS 10.3.1):

What's New in iOS 10.3.2:

Find My iPhone

  • View the current or last known location of your AirPods
  • Play a sound on one or both AirPods to help you find them

Siri

  • Support for paying and checking status of bills with payment apps
  • Support for scheduling with ride booking apps
  • Support for checking car fuel level, lock status, turning on lights and activating horn with automaker apps
  • Cricket sports scores and statistics for Indian Premier League and International Cricket Council

CarPlay

  • Shortcuts in the status bar for easy access to last used apps
  • Apple Music Now Playing screen gives access to Up Next and the currently playing song's album
  • Daily curated playlists and new music categories in Apple Music

Other improvements and fixes

  • Rent once and watch your iTunes movies across your devices
  • New Settings unified view for your Apple ID account information, settings and devices
  • Hourly weather in Maps using 3D Touch on the displayed current temperature
  • Support for searching "parked car" in Maps
  • Calendar adds the ability to delete an unwanted invite and report it as junk
  • Home app support to trigger scenes using accessories with switches and buttons
  • Home app support for accessory battery level status
  • Podcasts support for 3D Touch and Today widget to access recently updated shows
  • Podcast shows or episodes are shareable to Messages with full playback support
  • Fixes an issue that could prevent Maps from displaying your current location after resetting Location & Privacy
  • VoiceOver stability improvements for Phone, Safari and Mail

Security improvements:

AVEVideoEncoder

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: An application may be able to gain kernel privileges
  • Description: A memory corruption issue was addressed with improved memory handling.
  • CVE-2017-6989: Adam Donenfeld (@doadam) of the Zimperium zLabs Team

CoreAudio

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: An application may be able to read restricted memory
  • Description: A validation issue was addressed with improved input sanitization.
  • CVE-2017-2502: Yangkang (@dnpushme) of Qihoo360 Qex Team

iBooks

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: A maliciously crafted book may open arbitrary websites without user permission
  • Description: A URL handling issue was addressed through improved state management.
  • CVE-2017-2497: Jun Kokatsu (@shhnjk)

iBooks

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: An application may be able to execute arbitrary code with root privileges
  • Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.
  • CVE-2017-6981: evi1m0 of YSRC (sec.ly.com)

IOSurface

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: An application may be able to gain kernel privileges
  • Description: A memory corruption issue was addressed with improved memory handling.
  • CVE-2017-6979: Adam Donenfeld of Zimperium zLabs

Kernel

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: An application may be able to execute arbitrary code with kernel privileges
  • Description: A race condition was addressed through improved locking.
  • CVE-2017-2501: Ian Beer of Google Project Zero

Kernel

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: An application may be able to read restricted memory
  • Description: A validation issue was addressed with improved input sanitization.
  • CVE-2017-2507: Ian Beer of Google Project Zero
  • CVE-2017-6987: Patrick Wardle of Synack

Notifications

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: An application may be able to cause a denial of service
  • Description: A denial of service issue was addressed through improved memory handling.
  • CVE-2017-6982: Vincent Desmurs (vincedes3), Sem Voigtlander (OxFEEDFACE), and Joseph Shenton of CoffeeBreakers

Safari

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Visiting a maliciously crafted webpage may lead to an application denial of service
  • Description: An issue in Safari's history menu was addressed through improved memory handling.
  • CVE-2017-2495: Tubasa Iinuma (@llamakko_cafe) of Gehirn Inc.

Security

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Update to the certificate trust policy
  • Description: A certificate validation issue existed in the handling of untrusted certificates. This issue was addressed through improved user handling of trust acceptance.
  • CVE-2017-2498: Andrew Jerman

SQLite

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: A maliciously crafted SQL query may lead to arbitrary code execution
  • Description: A use after free issue was addressed through improved memory management.
  • CVE-2017-2513: found by OSS-Fuzz

SQLite

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: A maliciously crafted SQL query may lead to arbitrary code execution
  • Description: A buffer overflow issue was addressed through improved memory handling.
  • CVE-2017-2518: found by OSS-Fuzz
  • CVE-2017-2520: found by OSS-Fuzz

SQLite

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: A maliciously crafted SQL query may lead to arbitrary code execution
  • Description: A memory corruption issue was addressed with improved memory handling.
  • CVE-2017-2519: found by OSS-Fuzz

SQLite

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to arbitrary code execution
  • Description: Multiple memory corruption issues were addressed with improved input validation.
  • CVE-2017-6983: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative
  • CVE-2017-6991: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative

TextInput

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Parsing maliciously crafted data may lead to arbitrary code execution
  • Description: A memory corruption issue was addressed with improved memory handling.
  • CVE-2017-2524: Ian Beer of Google Project Zero

WebKit

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to arbitrary code execution
  • Description: Multiple memory corruption issues were addressed with improved memory handling.
  • CVE-2017-2496: Apple
  • CVE-2017-2505: lokihardt of Google Project Zero
  • CVE-2017-2506: Zheng Huang of the Baidu Security Lab working with Trend Micro's Zero Day Initiative
  • CVE-2017-2514: lokihardt of Google Project Zero
  • CVE-2017-2515: lokihardt of Google Project Zero
  • CVE-2017-2521: lokihardt of Google Project Zero
  • CVE-2017-2525: Kai Kang (4B5F5F4B) of Tencent's Xuanwu Lab (tencent.com) working with Trend Micro's Zero Day Initiative
  • CVE-2017-2526: Kai Kang (4B5F5F4B) of Tencent's Xuanwu Lab (tencent.com) working with Trend Micro's Zero Day Initiative
  • CVE-2017-2530: an anonymous researcher
  • CVE-2017-2531: lokihardt of Google Project Zero
  • CVE-2017-2538: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative
  • CVE-2017-2539: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative
  • CVE-2017-2544: 360 Security (@mj0011sec) working with Trend Micro's Zero Day Initiative
  • CVE-2017-2547: lokihardt of Google Project Zero, Team Sniper (Keen Lab and PC Mgr) working with Trend Micro's Zero Day Initiative
  • CVE-2017-6980: lokihardt of Google Project Zero
  • CVE-2017-6984: lokihardt of Google Project Zero

WebKit

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to universal cross site scripting
  • Description: A logic issue existed in the handling of WebKit Editor commands. This issue was addressed with improved state management.
  • CVE-2017-2504: lokihardt of Google Project Zero

WebKit

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to universal cross site scripting
  • Description: A logic issue existed in the handling of WebKit container nodes. This issue was addressed with improved state management.
  • CVE-2017-2508: lokihardt of Google Project Zero

WebKit

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to universal cross site scripting
  • Description: A logic issue existed in the handling of pageshow events. This issue was addressed with improved state management.
  • CVE-2017-2510: lokihardt of Google Project Zero

WebKit

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to universal cross site scripting
  • Description: A logic issue existed in the handling of WebKit cached frames. This issue was addressed with improved state management.
  • CVE-2017-2528: lokihardt of Google Project Zero

WebKit

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to arbitrary code execution
  • Description: Multiple memory corruption issues with addressed through improved memory handling.
  • CVE-2017-2536: Samuel Groß and Niklas Baumstark working with Trend Micro's Zero Day Initiative

WebKit

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to universal cross site scripting
  • Description: A logic issue existed in frame loading. This issue was addressed with improved state management.
  • CVE-2017-2549: lokihardt of Google Project Zero

WebKit Web Inspector

  • Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
  • Impact: An application may be able to execute unsigned code
  • Description: A memory corruption issue was addressed with improved memory handling.
  • CVE-2017-2499: George Dan (@theninjaprawn)

Previous versions:

Apple iPhone iOS 10.3.2 Firmware Update

Apple iPhone iOS 10.3.1 Firmware Update

Apple iPhone iOS 10.2.1 Firmware Update

Apple iPhone iOS 10.2 Firmware Update

Download links for iOS 10.1.1 (previous version) 2016-11-01:

Download links for iOS 10.1 (previous version) 2016-10-25:

Download links for iOS 10.0.2 (previous version) 2016-09-23:

Download links for iOS 10.0.1 (previous version) 2016-08-25:

Download links for iOS 9.3.5 2016-08-25:

Download links for iOS 9.3.4 2016-08-04:

Download links for iOS 9.3.3 2016-07-19:

Download links for iOS 9.3.2 2016-05-16:

Download links for iOS 9.3.1 2016-04-04:

Download links for iOS 9.3 2016-03-22:

Download links for iOS 9.2.1:

iPhone 6s Plus (iPhone 8,2)
iPhone 6s (iPhone 8,1)
iPhone 6 (iPhone 7,2)
iPhone 6 Plus (iPhone 7,1)
iPhone 5s China (iPhone 6,2)
iPhone 5S GSM (iPhone 6,1)
iPhone 5C Global (iPhone 5,4)
iPhone 5C GSM (iPhone 5,3)
iPhone 5 Global (iPhone 5,2)
iPhone 5 GSM (iPhone 5,1)
iPhone 4S (iPhone 4,1)

Download links for iOS 9.2:

Download links for iOS 9.1:

Download links for iOS 9.0.2:

Download links for iOS 9.0.1:

Download links for iOS 9.0:

Download links for iOS 8.4.1:

Download links for iOS 8.4:

Download links for iOS 8.3:

Download links for iOS 8.2:

Download links for iOS 8.1.3: