CVE-2026-20617

CWE-362Race Condition10 documents5 sources
Severity
7.0HIGH
EPSS
0.0%
top 98.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 11
Latest updateFeb 12

Description

A race condition was addressed with improved state handling. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sonoma 14.8.4, macOS Tahoe 26.3, tvOS 26.3, visionOS 26.3, watchOS 26.3. An app may be able to gain root privileges.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages11 packages

CVEListV5apple/macos< 14.8.4+1
NVDapple/macos14.014.8.4+1
CVEListV5apple/tvos< 26.3
NVDapple/tvos< 26.3
NVDapple/ipados< 26.3

🔴Vulnerability Details

2
GHSA
GHSA-4q59-wccf-6q9r: A race condition was addressed with improved state handling2026-02-12
CVEList
CVE-2026-20617: A race condition was addressed with improved state handling2026-02-11

📋Vendor Advisories

6
Apple
CVE-2026-20617: tvOS 26.32026-02-11
Apple
CVE-2026-20617: watchOS 26.32026-02-11
Apple
CVE-2026-20617: macOS Sonoma 14.8.42026-02-11
Apple
CVE-2026-20617: visionOS 26.32026-02-11
Apple
CVE-2026-20617: iOS 26.3 and iPadOS 26.32026-02-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-20617 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-20617 (HIGH CVSS 7) | A race condition was addressed with | cvebase.io