CVE-2026-20623Sensitive Information Exposure in Apple Macos

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 11
Latest updateFeb 12

Description

A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3. An app may be able to access protected user data.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5apple/macos< 26.3
NVDapple/macos< 26.3

🔴Vulnerability Details

2
GHSA
GHSA-h6jx-x5f4-qmj9: A permissions issue was addressed by removing the vulnerable code2026-02-12
CVEList
CVE-2026-20623: A permissions issue was addressed by removing the vulnerable code2026-02-11

📋Vendor Advisories

1
Apple
CVE-2026-20623: macOS Tahoe 26.32026-02-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-20623 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-20623 — Sensitive Information Exposure | cvebase