Vulnerability Description
A race condition was addressed with improved state handling. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sonoma 14.8.4, macOS Tahoe 26.3, tvOS 26.3, visionOS 26.3, watchOS 26.3. An app may be able to gain root privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Ipados | < 26.3 |
| Apple | Iphone Os | < 26.3 |
| Apple | Macos | >= 14.0, < 14.8.4 |
| Apple | Tvos | < 26.3 |
| Apple | Visionos | < 26.3 |
| Apple | Watchos | < 26.3 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/126346Release NotesVendor Advisory
- https://support.apple.com/en-us/126348Release NotesVendor Advisory
- https://support.apple.com/en-us/126350Release NotesVendor Advisory
- https://support.apple.com/en-us/126351Release NotesVendor Advisory
- https://support.apple.com/en-us/126352Release NotesVendor Advisory
- https://support.apple.com/en-us/126353Release NotesVendor Advisory
FAQ
What is CVE-2026-20617?
CVE-2026-20617 is a vulnerability with a CVSS score of 7.0 (HIGH). A race condition was addressed with improved state handling. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sonoma 14.8.4, macOS Tahoe 26.3, tvOS 26.3, visionOS 26.3, watchOS 26.3. An app may ...
How severe is CVE-2026-20617?
CVE-2026-20617 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-20617?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Ipados, Apple Iphone Os, Apple Macos, Apple Tvos, Apple Visionos.