CVE-2026-20677
Race Condition in Apple OS Symbolic Link Handling Enables Sandbox Bypass
Publication date: 2026-02-11
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | visionos | to 26.3 (exc) |
| apple | ipados | to 18.7.5 (exc) |
| apple | ipados | From 26.0 (inc) to 26.3 (exc) |
| apple | iphone_os | to 18.7.5 (exc) |
| apple | iphone_os | From 26.0 (inc) to 26.3 (exc) |
| apple | macos | to 14.8.4 (exc) |
| apple | macos | From 26.0 (inc) to 26.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
| CWE-367 | The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition related to the handling of symbolic links in certain Apple operating systems. Due to this issue, a shortcut (symbolic link) might be exploited to bypass sandbox restrictions, potentially allowing unauthorized access or actions.
How can this vulnerability impact me? :
The vulnerability could allow an attacker to bypass sandbox restrictions on affected Apple devices. This means that malicious shortcuts might enable unauthorized access to system resources or data that should be isolated, potentially compromising system security.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Apple devices to the fixed versions of the operating systems as soon as possible.
- macOS Tahoe 26.3
- macOS Sonoma 14.8.4
- iOS 18.7.5 and iPadOS 18.7.5
- visionOS 26.3
- iOS 26.3 and iPadOS 26.3