Vulnerability Description
This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, macOS Sonoma 14.8.5, macOS Tahoe 26.3, macOS Tahoe 26.4. An app may be able to access user-sensitive data.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Ipados | < 26.3 |
| Apple | Iphone Os | < 26.3 |
| Apple | Macos | >= 14.0, < 14.8.4 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/126346Release NotesVendor Advisory
- https://support.apple.com/en-us/126348Release NotesVendor Advisory
- https://support.apple.com/en-us/126349Release NotesVendor Advisory
- https://support.apple.com/en-us/126350Release NotesVendor Advisory
- https://support.apple.com/en-us/126794Release NotesVendor Advisory
- https://support.apple.com/en-us/126795Release NotesVendor Advisory
- https://support.apple.com/en-us/126796Release NotesVendor Advisory
FAQ
What is CVE-2026-20694?
CVE-2026-20694 is a vulnerability with a CVSS score of 5.5 (MEDIUM). This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, macOS Sonoma 14.8.5, macO...
How severe is CVE-2026-20694?
CVE-2026-20694 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-20694?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Ipados, Apple Iphone Os, Apple Macos.