CVE-2026-20694

CWE-59CWE-618 documents5 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 99.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, macOS Sonoma 14.8.5, macOS Tahoe 26.3, macOS Tahoe 26.4. An app may be able to access user-sensitive data.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

CVEListV5apple/macos< 14.8.4+5
NVDapple/macos14.014.8.4+2
NVDapple/ipados< 26.3
CVEListV5apple/ios_and_ipados< 26.3
NVDapple/iphone_os< 26.3

🔴Vulnerability Details

2
CVEList
CVE-2026-20694: This issue was addressed with improved handling of symlinks2026-03-25
GHSA
GHSA-7pcg-jhjm-w87w: This issue was addressed with improved handling of symlinks2026-03-25

📋Vendor Advisories

4
Apple
CVE-2026-20694: macOS Tahoe 26.32026-02-11
Apple
CVE-2026-20694: macOS Sonoma 14.8.42026-02-11
Apple
CVE-2026-20694: macOS Sequoia 15.7.42026-02-11
Apple
CVE-2026-20694: iOS 26.3 and iPadOS 26.32026-02-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-20694 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-20694 (MEDIUM CVSS 5.5) | This issue was addressed with impro | cvebase.io