CVE-2026-20655
Analyzed Analyzed - Analysis Complete
Authorization Bypass in iOS/iPadOS Allows Sensitive Data Exposure

Publication date: 2026-02-11

Last updated on: 2026-04-02

Assigner: Apple Inc.

Description
An authorization issue was addressed with improved state management. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3. An attacker with physical access to a locked device may be able to view sensitive user information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-11
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-02-12
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
apple ipados to 18.7.5 (exc)
apple ipados From 26.0 (inc) to 26.3 (exc)
apple iphone_os to 18.7.5 (exc)
apple iphone_os From 26.0 (inc) to 26.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an authorization issue related to state management in certain Apple operating systems. Specifically, it allows an attacker with physical access to a locked device to potentially view sensitive user information.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow someone who has physical access to your locked device to bypass authorization controls and access sensitive information stored on the device.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that your devices are updated to the fixed versions of the operating systems: iOS 26.3, iPadOS 26.3, iOS 18.7.5, or iPadOS 18.7.5.

Additionally, since the vulnerability requires physical access to a locked device, maintain strict physical security controls to prevent unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart