CVE-2026-20671

A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to intercept network traffic.
References
Link Resource
https://support.apple.com/en-us/126346 Release Notes Vendor Advisory
https://support.apple.com/en-us/126347 Release Notes Vendor Advisory
https://support.apple.com/en-us/126348 Release Notes Vendor Advisory
https://support.apple.com/en-us/126349 Release Notes Vendor Advisory
https://support.apple.com/en-us/126350 Release Notes Vendor Advisory
https://support.apple.com/en-us/126351 Release Notes Vendor Advisory
https://support.apple.com/en-us/126352 Release Notes Vendor Advisory
https://support.apple.com/en-us/126353 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

17 Feb 2026, 20:03

Type Values Removed Values Added
First Time Apple watchos
Apple tvos
Apple iphone Os
Apple visionos
Apple ipados
Apple
Apple macos
References () https://support.apple.com/en-us/126346 - () https://support.apple.com/en-us/126346 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/126347 - () https://support.apple.com/en-us/126347 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/126348 - () https://support.apple.com/en-us/126348 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/126349 - () https://support.apple.com/en-us/126349 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/126350 - () https://support.apple.com/en-us/126350 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/126351 - () https://support.apple.com/en-us/126351 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/126352 - () https://support.apple.com/en-us/126352 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/126353 - () https://support.apple.com/en-us/126353 - Release Notes, Vendor Advisory
CWE CWE-77
CPE cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

12 Feb 2026, 17:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.1

11 Feb 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-11 23:16

Updated : 2026-02-17 20:43


NVD link : CVE-2026-20671

Mitre link : CVE-2026-20671

CVE.ORG link : CVE-2026-20671


JSON object : View

Products Affected

apple

  • watchos
  • iphone_os
  • visionos
  • tvos
  • ipados
  • macos
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')