Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20650: An attacker in a privileged network position may be able to perform denial-of-service attack using crafted Bluetooth packets in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2026-20650cvecve-2026-20650
Published: Wed Feb 11 2026 (02/11/2026, 22:58:12 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A denial-of-service issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, tvOS 26.3, visionOS 26.3, watchOS 26.3. An attacker in a privileged network position may be able to perform denial-of-service attack using crafted Bluetooth packets.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 02:55:14 UTC

Technical Analysis

CVE-2026-20650 is a denial-of-service (DoS) vulnerability identified in Apple’s iOS and iPadOS platforms, as well as macOS Tahoe, tvOS, visionOS, and watchOS, all fixed in version 26.3 releases. The vulnerability arises from insufficient validation of Bluetooth packets, allowing an attacker in a privileged network position—such as within Bluetooth communication range or on a network segment capable of intercepting or injecting Bluetooth traffic—to craft malicious packets that trigger resource exhaustion or crash the affected device’s Bluetooth subsystem. This leads to a denial-of-service condition, rendering the device’s Bluetooth functionality unavailable and potentially impacting overall device stability. The CVSS v3.1 score of 7.5 (High) reflects the vulnerability’s ease of exploitation (network vector, no privileges or user interaction required) and its impact on availability. The issue is categorized under CWE-400, which relates to uncontrolled resource consumption, indicating the attack likely exploits resource exhaustion or similar mechanisms. Apple’s remediation involved improved validation of incoming Bluetooth packets to prevent malformed or malicious packets from causing the DoS condition. Although no exploits have been observed in the wild, the vulnerability poses a significant risk given the widespread use of Apple devices and Bluetooth’s integral role in device connectivity and functionality.

Potential Impact

The primary impact of CVE-2026-20650 is the disruption of device availability through denial-of-service attacks targeting Bluetooth functionality. Organizations relying on Apple devices for critical communications, authentication (e.g., via Bluetooth peripherals), or IoT integrations may experience service interruptions, degraded productivity, or operational delays. In environments where Bluetooth is used for access control, medical devices, or industrial systems, this vulnerability could cause significant operational risks. Since exploitation requires a privileged network position, attackers may need proximity or network access, limiting remote exploitation but increasing risk in public or shared spaces. The lack of impact on confidentiality or integrity reduces risks of data breaches but does not diminish the operational impact. The vulnerability could also be leveraged as part of a broader attack chain to cause disruption or distraction during targeted campaigns. Given the large global user base of Apple devices, the potential scale of impact is substantial, especially in sectors heavily dependent on mobile and wearable Apple technology.

Mitigation Recommendations

To mitigate CVE-2026-20650, organizations should promptly deploy Apple’s security updates starting with iOS 26.3, iPadOS 26.3, and corresponding versions for other Apple OSes. Network administrators should monitor Bluetooth traffic for anomalies and consider segmenting or restricting Bluetooth communications in sensitive environments. Employing Bluetooth device whitelisting and disabling Bluetooth when not in use can reduce exposure. Physical security controls to limit attacker proximity are also beneficial. For high-security environments, consider using endpoint detection and response (EDR) solutions capable of detecting abnormal Bluetooth activity. Regularly audit device configurations and educate users about the risks of connecting to unknown Bluetooth devices. Finally, maintain an incident response plan that includes procedures for handling Bluetooth-related disruptions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-11-11T14:43:07.864Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dcc4b57a58fa1d960a0

Added to database: 2/11/2026, 11:16:28 PM

Last enriched: 4/3/2026, 2:55:14 AM

Last updated: 4/6/2026, 5:44:58 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses