Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20640: An attacker with physical access to iPhone may be able to take and view screenshots of sensitive data from the iPhone during iPhone Mirroring with Mac in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2026-20640cvecve-2026-20640
Published: Wed Feb 11 2026 (02/11/2026, 22:58:22 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3. An attacker with physical access to iPhone may be able to take and view screenshots of sensitive data from the iPhone during iPhone Mirroring with Mac.

AI-Powered Analysis

AILast updated: 02/19/2026, 13:31:22 UTC

Technical Analysis

CVE-2026-20640 is a vulnerability identified in Apple iOS and iPadOS that affects the iPhone Mirroring feature when connected to a Mac. The root cause is an inconsistent user interface state management flaw (CWE-703), which allows an attacker with physical access to the iPhone to take screenshots of sensitive data displayed during the mirroring session. This vulnerability does not require any privileges or user interaction, making it accessible to anyone with physical access to the device. The attacker can exploit this by initiating or manipulating the mirroring session to capture screen content without the device owner’s consent or knowledge. The issue was addressed by Apple in iOS and iPadOS 26.3 through improved state management that prevents unauthorized screenshot capture during mirroring. The CVSS v3.1 base score is 4.6, indicating medium severity, with the vector AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires physical access, has low complexity, no privileges or user interaction, affects confidentiality with high impact, but does not affect integrity or availability. No known exploits have been reported in the wild, and the affected versions are unspecified but presumed to be all versions prior to 26.3. This vulnerability is particularly relevant in scenarios where iPhones are physically accessible and connected to Macs, such as corporate environments, public kiosks, or shared workspaces.

Potential Impact

The primary impact of CVE-2026-20640 is the unauthorized disclosure of sensitive information through screenshots captured during iPhone Mirroring with a Mac. This can lead to confidentiality breaches, especially if sensitive corporate or personal data is displayed on the device during mirroring. Although the attack requires physical access, it does not require device unlocking or user interaction, increasing the risk in environments where devices are left unattended or accessible to unauthorized personnel. The integrity and availability of the device or data are not affected. For organizations, this vulnerability could lead to data leakage, compliance violations, and potential reputational damage if sensitive information is exposed. The risk is heightened in sectors with strict data privacy requirements, such as finance, healthcare, and government. However, the limited attack vector (physical access) and absence of remote exploitation reduce the overall threat level compared to remote vulnerabilities.

Mitigation Recommendations

To mitigate CVE-2026-20640, organizations and users should promptly update all affected Apple devices to iOS and iPadOS version 26.3 or later, where the vulnerability is fixed. Physical security controls should be strengthened to prevent unauthorized access to devices, especially in shared or public environments. Policies should enforce locking devices when unattended and restricting mirroring capabilities to trusted Macs only. Additionally, organizations can disable or restrict the use of iPhone Mirroring features in sensitive environments through mobile device management (MDM) solutions. Monitoring and auditing mirroring sessions can help detect unauthorized activity. User education about the risks of leaving devices unattended while connected to external systems is also recommended. Since no known exploits exist, proactive patching and physical security remain the most effective defenses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-11-11T14:43:07.861Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dcb4b57a58fa1d96056

Added to database: 2/11/2026, 11:16:27 PM

Last enriched: 2/19/2026, 1:31:22 PM

Last updated: 2/21/2026, 12:19:31 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats