Vulnerability Description
A race condition was addressed with improved handling of symbolic links. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS 26.3. A shortcut may be able to bypass sandbox restrictions.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Ipados | < 18.7.5 |
| Apple | Iphone Os | < 18.7.5 |
| Apple | Macos | < 14.8.4 |
| Apple | Visionos | < 26.3 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/126346Release NotesVendor Advisory
- https://support.apple.com/en-us/126347Release NotesVendor Advisory
- https://support.apple.com/en-us/126348Release NotesVendor Advisory
- https://support.apple.com/en-us/126350Release NotesVendor Advisory
- https://support.apple.com/en-us/126353Release NotesVendor Advisory
FAQ
What is CVE-2026-20677?
CVE-2026-20677 is a vulnerability with a CVSS score of 9.0 (CRITICAL). A race condition was addressed with improved handling of symbolic links. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS ...
How severe is CVE-2026-20677?
CVE-2026-20677 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-20677?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Ipados, Apple Iphone Os, Apple Macos, Apple Visionos.