CVE-2026-20667
Sandbox Escape via Logic Flaw in Apple watchOS and macOS
Publication date: 2026-02-11
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ipados | to 26.3 (exc) |
| apple | iphone_os | to 26.3 (exc) |
| apple | watchos | to 26.3 (exc) |
| apple | macos | to 14.8.4 (exc) |
| apple | macos | From 15.0 (inc) to 15.7.4 (exc) |
| apple | macos | From 26.0 (inc) to 26.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-693 | The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a logic issue that was addressed by implementing improved checks. It allows an app to potentially break out of its sandbox, which is a security mechanism designed to isolate apps and restrict their access to system resources and data.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an app to escape its sandbox restrictions, potentially gaining unauthorized access to system resources or data that should be isolated. This could lead to unauthorized actions or data exposure on affected Apple devices.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Apple devices to the fixed versions: watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 26.3, or iPadOS 26.3.