CVE-2026-20629
Temporary File Handling Flaw in macOS Tahoe Risks Data Exposure
Publication date: 2026-02-11
Last updated on: 2026-02-17
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | macos | to 26.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-922 | The product stores sensitive information without properly limiting read or write access by unauthorized actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a privacy issue related to the handling of temporary files in macOS Tahoe. Due to improper handling, an application may be able to access user-sensitive data that it should not have access to. The issue has been addressed and fixed in macOS Tahoe version 26.3.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an application to access sensitive user data without authorization, potentially leading to privacy breaches and unauthorized data exposure.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed in macOS Tahoe 26.3. To mitigate this issue, you should update your system to macOS Tahoe 26.3 or later.