Cyber Posture

CVE-2026-20626

High

Published: 11 February 2026

Published
11 February 2026
Modified
02 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 3.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-20626 is a high-severity Missing Authorization (CWE-862) vulnerability in Apple Macos. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to system resources, directly mitigating the missing authorization checks that enable malicious apps to escalate to root privileges.

prevent

Employs least privilege to restrict user and process access to only necessary permissions, preventing low-privileged malicious apps from gaining root-level control.

prevent

Requires timely remediation of flaws through patching, addressing the specific authorization vulnerability fixed in updated Apple OS versions.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Missing authorization vulnerability directly enables local privilege escalation from low-privileged context (e.g., malicious app) to root via exploitation of the flaw.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

This issue was addressed with improved checks. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.4, macOS Tahoe 26.3, visionOS 26.3. A malicious app may be able to gain root privileges.

Deeper analysisAI

CVE-2026-20626 is a missing authorization vulnerability (CWE-862) in Apple operating systems that enables privilege escalation. It affects iOS versions prior to 26.3, iPadOS prior to 26.3, macOS Sequoia prior to 15.7.4, macOS Tahoe prior to 26.3, and visionOS prior to 26.3. The issue was addressed through improved checks, as indicated by its CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high-impact local exploitation potential.

A local attacker with low privileges, such as one executing a malicious app installed by the user, can exploit this vulnerability to gain root privileges on the affected system. Successful exploitation grants full control, potentially allowing unauthorized access to sensitive data, modification of system files, and disruption of services, with high impacts on confidentiality, integrity, and availability.

Apple's security advisories detail the fix via improved authorization checks in the listed patched versions. Relevant support pages include https://support.apple.com/en-us/126346, https://support.apple.com/en-us/126348, https://support.apple.com/en-us/126349, and https://support.apple.com/en-us/126353, which practitioners should review for full patch details and deployment guidance.

Details

CWE(s)

Affected Products

apple
ipados
≤ 26.3
apple
iphone os
≤ 26.3
apple
macos
15.0 — 15.7.4 · 26.0 — 26.3
apple
visionos
≤ 26.3

CVEs Like This One

CVE-2026-20688Same product: Apple Ipados
CVE-2026-20615Same product: Apple Ipados
CVE-2025-24154Same product: Apple Ipados
CVE-2026-20677Same product: Apple Ipados
CVE-2025-31184Same product: Apple Ipados
CVE-2025-24173Same product: Apple Ipados
CVE-2025-31182Same product: Apple Ipados
CVE-2025-30456Same product: Apple Ipados
CVE-2025-43510Same product: Apple Ipados
CVE-2025-24159Same product: Apple Ipados

References