Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20628: An app may be able to break out of its sandbox in Apple macOS

0
High
VulnerabilityCVE-2026-20628cvecve-2026-20628
Published: Wed Feb 11 2026 (02/11/2026, 22:58:50 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.

AI-Powered Analysis

AILast updated: 02/19/2026, 14:00:25 UTC

Technical Analysis

CVE-2026-20628 is a sandbox escape vulnerability affecting multiple Apple operating systems including macOS (Tahoe, Sonoma, Sequoia), iOS, iPadOS, watchOS, tvOS, and visionOS. The root cause is a permissions issue that allows an application to break out of its sandbox environment, which is designed to isolate apps and restrict their access to system resources and user data. This vulnerability falls under CWE-284, indicating improper access control. Exploitation requires user interaction but no prior privileges, meaning a malicious app or crafted content could trick a user into triggering the sandbox escape. The vulnerability impacts confidentiality and integrity by potentially allowing unauthorized access to sensitive data or system components outside the app’s sandbox. Availability is not affected. Apple has released fixes in versions 26.3 for watchOS, tvOS, visionOS, iOS, and iPadOS, and versions 14.8.4, 15.7.4, and 26.3 for macOS variants. The CVSS v3.1 base score is 7.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N), reflecting local attack vector, low attack complexity, no privileges required, user interaction needed, unchanged scope, and high impact on confidentiality and integrity. No known exploits have been reported in the wild to date, but the vulnerability’s nature makes it a significant risk if weaponized. The issue highlights the importance of sandbox enforcement and strict permission controls in Apple’s ecosystem to prevent privilege escalation and data breaches.

Potential Impact

This vulnerability can have serious consequences for organizations relying on Apple devices, as it allows malicious applications to escape sandbox restrictions and gain unauthorized access to sensitive system resources and user data. The breach of sandbox boundaries undermines the security model that protects users from malicious or compromised apps, potentially leading to data leakage, unauthorized data modification, or further privilege escalation. Confidentiality and integrity of corporate and personal information stored or processed on affected devices are at risk. Although availability is not impacted, the ability to bypass sandbox controls can facilitate more advanced attacks, including persistent malware installation or lateral movement within a network. Organizations in sectors with high security requirements such as finance, healthcare, government, and technology are particularly vulnerable. The widespread use of Apple devices globally means that the threat surface is large, and failure to apply patches promptly could result in targeted attacks exploiting this vulnerability.

Mitigation Recommendations

To mitigate CVE-2026-20628, organizations should immediately deploy the security updates released by Apple for all affected platforms: watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5, iPadOS 18.7.5, visionOS 26.3, and iOS/iPadOS 26.3. Beyond patching, organizations should enforce strict application vetting and restrict installation of apps from untrusted sources to reduce the risk of malicious apps exploiting sandbox escape vulnerabilities. Employing Mobile Device Management (MDM) solutions to control app permissions and monitor for anomalous behavior can help detect exploitation attempts. User education is critical to minimize risky interactions that could trigger the vulnerability. Additionally, leveraging endpoint detection and response (EDR) tools tailored for Apple environments can aid in identifying suspicious activities indicative of sandbox escape attempts. Regular audits of app permissions and sandbox configurations should be conducted to ensure no deviations from security policies. Finally, maintaining up-to-date backups and incident response plans will help organizations recover quickly if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-11-11T14:43:07.860Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dca4b57a58fa1d95b8d

Added to database: 2/11/2026, 11:16:26 PM

Last enriched: 2/19/2026, 2:00:25 PM

Last updated: 2/21/2026, 12:21:38 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats