CVE-2026-20667

CWE-6939 documents5 sources
Severity
8.8HIGH
EPSS
0.0%
top 95.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 11
Latest updateFeb 12

Description

A logic issue was addressed with improved checks. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, watchOS 26.3. An app may be able to break out of its sandbox.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages7 packages

CVEListV5apple/macos< 15.7.4+2
NVDapple/macos15.015.7.4+2
NVDapple/ipados< 26.3
CVEListV5apple/watchos< 26.3
NVDapple/watchos< 26.3

🔴Vulnerability Details

2
GHSA
GHSA-2jp6-x3f3-3m72: A logic issue was addressed with improved checks2026-02-12
CVEList
CVE-2026-20667: A logic issue was addressed with improved checks2026-02-11

📋Vendor Advisories

5
Apple
CVE-2026-20667: macOS Sonoma 14.8.42026-02-11
Apple
CVE-2026-20667: macOS Tahoe 26.32026-02-11
Apple
CVE-2026-20667: macOS Sequoia 15.7.42026-02-11
Apple
CVE-2026-20667: iOS 26.3 and iPadOS 26.32026-02-11
Apple
CVE-2026-20667: watchOS 26.32026-02-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-20667 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-20667 (HIGH CVSS 8.8) | A logic issue was addressed with im | cvebase.io