CVE-2026-20663: An app may be able to enumerate a user's installed apps in Apple iOS and iPadOS
The issue was resolved by sanitizing logging. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An app may be able to enumerate a user's installed apps.
AI Analysis
Technical Summary
CVE-2026-20663 is a vulnerability identified in Apple’s iOS and iPadOS platforms that allows an application to enumerate the list of installed applications on a device. The root cause is improper sanitization of logging data, which inadvertently exposes information about installed apps. This vulnerability falls under CWE-532 (Information Exposure Through Log Files). An app with limited privileges and local access can exploit this flaw without requiring user interaction, enabling it to gather information about other installed applications. This can be leveraged by malicious actors to profile users, identify installed security or enterprise apps, or tailor subsequent attacks based on the app inventory. Apple resolved this issue by sanitizing the logging mechanism in iOS 26.3, iPadOS 26.3, iOS 18.7.5, and iPadOS 18.7.5. The vulnerability has a CVSS v3.1 base score of 3.3, reflecting its low impact primarily on confidentiality. There are no known exploits in the wild, and the affected versions are unspecified but presumably all versions prior to the patched releases. The vulnerability does not impact system integrity or availability and requires local access with limited privileges, making remote exploitation unlikely. However, the ability to enumerate installed apps can aid attackers in reconnaissance and targeted attacks.
Potential Impact
The primary impact of CVE-2026-20663 is the disclosure of information about installed applications on iOS and iPadOS devices. This can compromise user privacy by revealing app usage patterns and potentially sensitive applications installed on the device. For organizations, this could expose the presence of security, enterprise, or proprietary apps, aiding attackers in crafting targeted attacks or bypassing security controls. Although the vulnerability does not allow direct compromise of device integrity or availability, the information gained can be used for social engineering, phishing, or further exploitation. The requirement for limited privileges and local access reduces the risk of widespread exploitation, but insider threats or malicious apps installed on the device could leverage this vulnerability. Overall, the impact is low but relevant in environments where app confidentiality is critical, such as corporate or government devices.
Mitigation Recommendations
To mitigate CVE-2026-20663, organizations and users should promptly update affected devices to iOS 26.3, iPadOS 26.3, iOS 18.7.5, or iPadOS 18.7.5 or later versions where the issue is fixed. Restricting app installation to trusted sources and enforcing strict app review policies can reduce the risk of malicious apps exploiting this vulnerability. Employ mobile device management (MDM) solutions to control app permissions and monitor installed applications. Additionally, limit local access to devices and educate users about the risks of installing untrusted apps. For high-security environments, consider disabling unnecessary logging or using enhanced logging controls if available. Regularly audit installed apps and device configurations to detect unauthorized applications that could exploit this flaw. Since the vulnerability involves information leakage through logs, reviewing and hardening logging configurations and access controls on devices can further reduce exposure.
Affected Countries
United States, China, Japan, Germany, United Kingdom, France, South Korea, Canada, Australia, India
CVE-2026-20663: An app may be able to enumerate a user's installed apps in Apple iOS and iPadOS
Description
The issue was resolved by sanitizing logging. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An app may be able to enumerate a user's installed apps.
AI-Powered Analysis
Technical Analysis
CVE-2026-20663 is a vulnerability identified in Apple’s iOS and iPadOS platforms that allows an application to enumerate the list of installed applications on a device. The root cause is improper sanitization of logging data, which inadvertently exposes information about installed apps. This vulnerability falls under CWE-532 (Information Exposure Through Log Files). An app with limited privileges and local access can exploit this flaw without requiring user interaction, enabling it to gather information about other installed applications. This can be leveraged by malicious actors to profile users, identify installed security or enterprise apps, or tailor subsequent attacks based on the app inventory. Apple resolved this issue by sanitizing the logging mechanism in iOS 26.3, iPadOS 26.3, iOS 18.7.5, and iPadOS 18.7.5. The vulnerability has a CVSS v3.1 base score of 3.3, reflecting its low impact primarily on confidentiality. There are no known exploits in the wild, and the affected versions are unspecified but presumably all versions prior to the patched releases. The vulnerability does not impact system integrity or availability and requires local access with limited privileges, making remote exploitation unlikely. However, the ability to enumerate installed apps can aid attackers in reconnaissance and targeted attacks.
Potential Impact
The primary impact of CVE-2026-20663 is the disclosure of information about installed applications on iOS and iPadOS devices. This can compromise user privacy by revealing app usage patterns and potentially sensitive applications installed on the device. For organizations, this could expose the presence of security, enterprise, or proprietary apps, aiding attackers in crafting targeted attacks or bypassing security controls. Although the vulnerability does not allow direct compromise of device integrity or availability, the information gained can be used for social engineering, phishing, or further exploitation. The requirement for limited privileges and local access reduces the risk of widespread exploitation, but insider threats or malicious apps installed on the device could leverage this vulnerability. Overall, the impact is low but relevant in environments where app confidentiality is critical, such as corporate or government devices.
Mitigation Recommendations
To mitigate CVE-2026-20663, organizations and users should promptly update affected devices to iOS 26.3, iPadOS 26.3, iOS 18.7.5, or iPadOS 18.7.5 or later versions where the issue is fixed. Restricting app installation to trusted sources and enforcing strict app review policies can reduce the risk of malicious apps exploiting this vulnerability. Employ mobile device management (MDM) solutions to control app permissions and monitor installed applications. Additionally, limit local access to devices and educate users about the risks of installing untrusted apps. For high-security environments, consider disabling unnecessary logging or using enhanced logging controls if available. Regularly audit installed apps and device configurations to detect unauthorized applications that could exploit this flaw. Since the vulnerability involves information leakage through logs, reviewing and hardening logging configurations and access controls on devices can further reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-11-11T14:43:07.865Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698d0dcd4b57a58fa1d960e3
Added to database: 2/11/2026, 11:16:29 PM
Last enriched: 2/19/2026, 1:53:19 PM
Last updated: 2/21/2026, 12:19:41 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.