Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20622: An app may be able to capture a user's screen in Apple macOS

0
High
VulnerabilityCVE-2026-20622cvecve-2026-20622
Published: Wed Mar 25 2026 (03/25/2026, 00:32:15 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3. An app may be able to capture a user's screen.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 02:04:12 UTC

Technical Analysis

CVE-2026-20622 is a privacy-related vulnerability in Apple macOS discovered and published in March 2026. The flaw arises from inadequate handling of temporary files within the operating system, which can be leveraged by a malicious application to capture the user's screen content without explicit consent or notification. This unauthorized screen capture capability poses a significant privacy risk, as sensitive information displayed on the screen could be recorded and exfiltrated by attackers. The vulnerability affects macOS versions prior to Sequoia 15.7.4 and Tahoe 26.3, where Apple implemented improved temporary file handling to mitigate the issue. Although no known exploits have been reported in the wild, the nature of the vulnerability suggests that any installed app with the ability to write or manipulate temporary files could potentially exploit this flaw. The vulnerability does not require user interaction such as clicking or granting permissions, but it does require the malicious app to be present on the system, implying that initial compromise or social engineering to install the app is a prerequisite. The absence of a CVSS score indicates the need for an expert severity assessment, which considers the high impact on confidentiality and privacy, moderate ease of exploitation given the need for app installation, and broad scope affecting all unpatched macOS users. This vulnerability highlights the importance of secure temporary file management and strict app sandboxing in modern operating systems.

Potential Impact

The primary impact of CVE-2026-20622 is a significant breach of user privacy and confidentiality. Unauthorized screen capture can expose sensitive personal and corporate information, including passwords, financial data, proprietary documents, and communications. For organizations, this could lead to data leaks, intellectual property theft, and compliance violations with data protection regulations such as GDPR or HIPAA. The vulnerability undermines user trust in macOS security and could facilitate espionage or targeted attacks against high-value individuals or enterprises. Since the exploit requires app installation, the threat vector includes malicious or compromised applications distributed via third-party sources or social engineering. The lack of user interaction requirement increases the stealthiness of the attack, making detection more difficult. Although availability and integrity of the system are not directly impacted, the confidentiality breach alone warrants urgent remediation. The global scale of macOS usage in both consumer and enterprise environments means the potential impact is widespread, particularly in sectors handling sensitive data such as finance, healthcare, government, and technology.

Mitigation Recommendations

To mitigate CVE-2026-20622, organizations and users should promptly update macOS to versions Sequoia 15.7.4 or Tahoe 26.3 or later, where the vulnerability is patched. Avoid installing applications from untrusted or unknown sources to reduce the risk of introducing malicious apps capable of exploiting this flaw. Employ strict application whitelisting and endpoint protection solutions that monitor and restrict unauthorized screen capture attempts or suspicious file operations involving temporary files. Implement robust user awareness training to prevent social engineering attacks that could lead to malicious app installation. Use macOS built-in privacy controls to limit screen recording permissions and regularly audit installed applications for suspicious behavior. For enterprises, consider deploying Mobile Device Management (MDM) solutions to enforce patch management and application control policies. Monitoring system logs for unusual temporary file activity or screen capture attempts can aid in early detection. Finally, maintain regular backups and incident response plans to address potential data breaches resulting from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-11-11T14:43:07.859Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c333d6f4197a8e3baae80e

Added to database: 3/25/2026, 1:01:10 AM

Last enriched: 3/25/2026, 2:04:12 AM

Last updated: 3/26/2026, 6:37:29 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses