Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20668: An app may be able to access sensitive user data in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2026-20668cvecve-2026-20668
Published: Wed Mar 25 2026 (03/25/2026, 00:35:39 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.3, visionOS 26.3. An app may be able to access sensitive user data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 02:01:25 UTC

Technical Analysis

CVE-2026-20668 is a security vulnerability identified in Apple’s iOS and iPadOS platforms, as well as macOS and visionOS, stemming from a logging issue where sensitive user data was not properly redacted before being recorded. This flaw allows a malicious or compromised app to access sensitive information that should have been protected, due to inadequate data sanitization in system logs. The vulnerability affects multiple Apple operating system versions, including iOS 18.7.7, iOS 26.3, iPadOS 18.7.7, iPadOS 26.3, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.3, and visionOS 26.3. Apple addressed this issue by improving data redaction in logging mechanisms in these updates. No public exploits have been reported yet, but the vulnerability’s nature means that any app installed on a vulnerable device could potentially extract sensitive data from logs if it has sufficient permissions. The vulnerability primarily impacts confidentiality, as unauthorized access to sensitive user data could lead to privacy breaches, identity theft, or further targeted attacks. The lack of a CVSS score requires an assessment based on the vulnerability’s characteristics, which indicate a high severity due to the potential data exposure and relatively straightforward exploitation by malicious apps. The vulnerability does not require user interaction beyond app installation, increasing its risk profile. This issue highlights the importance of secure logging practices and strict data redaction to prevent leakage of sensitive information through system logs.

Potential Impact

The primary impact of CVE-2026-20668 is the unauthorized disclosure of sensitive user data, which compromises confidentiality. Organizations using Apple devices could face data breaches exposing personal or corporate information, potentially leading to privacy violations, regulatory penalties, and reputational damage. Attackers exploiting this vulnerability could gain insights into user behavior, credentials, or other sensitive details logged by the system, which could be leveraged for further attacks such as phishing, identity theft, or lateral movement within networks. The vulnerability affects a broad range of Apple operating systems, increasing the scope of impacted devices globally. Since exploitation requires an app to be installed, supply chain attacks or malicious app distribution could amplify the threat. The absence of known exploits in the wild currently limits immediate risk, but the potential for future exploitation remains significant. Organizations with high-value targets or sensitive data on Apple devices are particularly at risk, as are users in sectors such as finance, healthcare, government, and critical infrastructure.

Mitigation Recommendations

To mitigate CVE-2026-20668, organizations and users should promptly apply the security updates released by Apple for iOS, iPadOS, macOS, and visionOS as listed (e.g., iOS 18.7.7, iOS 26.3, macOS Sequoia 15.7.5). Beyond patching, organizations should audit and restrict app installation policies to prevent unauthorized or untrusted applications from being installed on devices. Implementing Mobile Device Management (MDM) solutions can enforce app whitelisting and monitor app behavior. Review and minimize app permissions, especially those related to logging and data access, to reduce the risk of data leakage. Additionally, organizations should monitor logs and system behavior for unusual access patterns or attempts to read sensitive logs. Developers should follow best practices for secure logging, ensuring sensitive data is never logged in plaintext or without proper redaction. Security awareness training for users about the risks of installing untrusted apps can further reduce exposure. Finally, organizations should maintain an incident response plan to quickly address any suspected exploitation of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-11-11T14:43:07.866Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c333d8f4197a8e3baae866

Added to database: 3/25/2026, 1:01:12 AM

Last enriched: 3/25/2026, 2:01:25 AM

Last updated: 3/26/2026, 5:33:01 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses