Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20687: An app may be able to cause unexpected system termination or write kernel memory in Apple iOS and iPadOS

0
Critical
VulnerabilityCVE-2026-20687cvecve-2026-20687
Published: Wed Mar 25 2026 (03/25/2026, 00:35:38 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

CVE-2026-20687 is a use-after-free vulnerability in Apple iOS and iPadOS that allows a malicious app to cause unexpected system termination or write to kernel memory. This flaw arises from improper memory management and affects multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, and watchOS. The vulnerability is addressed in iOS 18. 7. 7, iPadOS 18. 7. 7, iOS 26. 4, iPadOS 26. 4, macOS Sequoia 15. 7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:51:27 UTC

Technical Analysis

CVE-2026-20687 is a critical use-after-free vulnerability discovered in Apple’s iOS and iPadOS platforms, also affecting macOS, tvOS, and watchOS. The flaw stems from improper memory management where an app can access memory after it has been freed, leading to undefined behavior such as system crashes or unauthorized writes to kernel memory. This vulnerability allows a malicious app to potentially corrupt kernel memory, which could enable privilege escalation, arbitrary code execution at the kernel level, or denial of service through unexpected system termination. The vulnerability affects multiple Apple operating systems and versions prior to the patched releases: iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, and watchOS 26.4. Exploitation requires an attacker to have an app installed on the device, but does not require user interaction beyond app execution. This increases the risk in environments where untrusted or malicious apps can be installed, such as enterprise devices with less restrictive app policies or jailbroken devices. Although no known exploits are currently reported in the wild, the severity of kernel memory corruption vulnerabilities warrants immediate attention. The vulnerability was reserved in November 2025 and published in March 2026, indicating recent discovery and patch availability. The lack of a CVSS score necessitates an expert severity assessment based on impact and exploitability factors.

Potential Impact

The potential impact of CVE-2026-20687 is significant for organizations relying on Apple devices. Successful exploitation could lead to kernel-level code execution, allowing attackers to bypass security controls, escalate privileges, and gain persistent access to sensitive systems. This could compromise confidentiality, integrity, and availability of affected devices. Unexpected system termination could disrupt business operations, especially in environments where Apple devices are critical for communication, data access, or control systems. The ability to write kernel memory may also facilitate installation of persistent malware or rootkits, complicating detection and remediation. Enterprises with BYOD policies or those using Apple devices in sensitive roles (e.g., healthcare, finance, government) face increased risk. The absence of known exploits currently reduces immediate threat but does not eliminate the risk, as attackers may develop exploits rapidly once patches are released. Failure to patch promptly could lead to targeted attacks or widespread exploitation in the future.

Mitigation Recommendations

Organizations should immediately verify that all Apple devices are updated to the patched versions: iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, and watchOS 26.4. Enforce strict app installation policies to prevent untrusted or unauthorized applications from being installed, including disabling sideloading and restricting app sources to the official Apple App Store. Employ mobile device management (MDM) solutions to automate patch deployment and monitor device compliance. Conduct regular audits of installed applications and remove any suspicious or unnecessary apps. Implement runtime protections such as kernel integrity monitoring and endpoint detection and response (EDR) tools capable of detecting anomalous kernel behavior. Educate users about the risks of installing untrusted apps and the importance of timely updates. For high-security environments, consider additional hardening measures such as disabling unnecessary services and enabling system-level exploit mitigations provided by Apple. Maintain incident response readiness to quickly isolate and remediate compromised devices if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-11-11T14:43:07.873Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c333d8f4197a8e3baae878

Added to database: 3/25/2026, 1:01:12 AM

Last enriched: 3/25/2026, 1:51:27 AM

Last updated: 3/25/2026, 3:49:42 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses