Description
A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS 26.3. An app may be able to gain root privileges.
Published: 2026-02-11
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

A path handling flaw was introduced in several Apple operating systems, allowing an application to bypass directory restrictions and access files outside its intended scope. The flaw is rooted in improper validation of file system paths, a classic directory traversal weakness. If successfully exploited, the application can gain root privileges, giving it full control over the device and the ability to modify system files or execute arbitrary code.

Affected Systems

Apple iOS and iPadOS versions earlier than 26.3, macOS Sonoma 14.8.4 and earlier versions, macOS Tahoe 26.3 and earlier, visionOS 26.3 and earlier. All driver and application contexts on these operating systems are susceptible as the vulnerability exists in core path handling APIs.

Risk and Exploitability

The CVSS base score of 7.8 classifies this as a high severity vulnerability. The EPSS score is less than 1%, indicating a low probability of exploitation in the near term. The flaw is not listed in the CISA KEV catalog, and the official advisory does not mention a known exploit. The likely attack vector is a local one: a malicious or compromised application installed on the device would need to perform the path traversal to elevate privileges. The impact of successful exploitation is complete deniability of the device, with the attacker able to read, modify, delete, or replace any file on the system.

Generated by OpenCVE AI on April 15, 2026 at 20:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest OS updates for iOS, iPadOS, macOS Sonoma, macOS Tahoe, and visionOS (versions 26.3 and 14.8.4 respectively).
  • Disable or uninstall third‑party applications that request extensive file system access without a clear business need.
  • In managed environments, enforce App Store‑only installation or use device management policies to restrict app installs from untrusted sources.

Generated by OpenCVE AI on April 15, 2026 at 20:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Title Path Traversal Vulnerability Allowing Root Privileges on Apple Devices

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to gain root privileges. A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS 26.3. An app may be able to gain root privileges.

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
Weaknesses CWE-22
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 12 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple visionos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple visionos

Wed, 11 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to gain root privileges.
References

Subscriptions

Apple Ios And Ipados Ipados Iphone Os Macos Visionos
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:20:25.706Z

Reserved: 2025-11-11T14:43:07.858Z

Link: CVE-2026-20615

cve-icon Vulnrichment

Updated: 2026-02-25T17:49:02.916Z

cve-icon NVD

Status : Modified

Published: 2026-02-11T23:16:05.060

Modified: 2026-04-02T19:21:10.353

Link: CVE-2026-20615

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:00:09Z

Weaknesses