CVE-2026-20671

A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to intercept network traffic.
References
Link Resource
https://support.apple.com/en-us/126346 Release Notes Vendor Advisory
https://support.apple.com/en-us/126347 Release Notes Vendor Advisory
https://support.apple.com/en-us/126348 Release Notes Vendor Advisory
https://support.apple.com/en-us/126349 Release Notes Vendor Advisory
https://support.apple.com/en-us/126350 Release Notes Vendor Advisory
https://support.apple.com/en-us/126351 Release Notes Vendor Advisory
https://support.apple.com/en-us/126352 Release Notes Vendor Advisory
https://support.apple.com/en-us/126353 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-11 23:16

Updated : 2026-02-17 20:43


NVD link : CVE-2026-20671

Mitre link : CVE-2026-20671

CVE.ORG link : CVE-2026-20671


JSON object : View

Products Affected

apple

  • watchos
  • macos
  • ipados
  • visionos
  • iphone_os
  • tvos
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')