CVE-2026-20615Path Traversal in Apple IOS AND Ipados

CWE-22Path Traversal8 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 91.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 11
Latest updateFeb 12

Description

A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS 26.3. An app may be able to gain root privileges.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages7 packages

CVEListV5apple/macos< 14.8.4+1
NVDapple/macos14.014.8.4+1
NVDapple/ipados< 26.3
CVEListV5apple/visionos< 26.3
NVDapple/visionos< 26.3

🔴Vulnerability Details

2
GHSA
GHSA-82p2-ccrf-wxw5: A path handling issue was addressed with improved validation2026-02-12
CVEList
CVE-2026-20615: A path handling issue was addressed with improved validation2026-02-11

📋Vendor Advisories

4
Apple
CVE-2026-20615: visionOS 26.32026-02-11
Apple
CVE-2026-20615: macOS Tahoe 26.32026-02-11
Apple
CVE-2026-20615: macOS Sonoma 14.8.42026-02-11
Apple
CVE-2026-20615: iOS 26.3 and iPadOS 26.32026-02-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-20615 Impact, Exploitability, and Mitigation Steps | Wiz