Description
A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3. An app may be able to access protected user data.
Published: 2026-02-11
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorised access to protected user data
Action: Apply patch
AI Analysis

Impact

A file‑level permissions flaw in macOS, addressed by removing vulnerable code, allows an application to read protected user data that it should not be able to access. The weakness is categorised as information exposure and can lead to confidentiality loss if a malicious or compromised app is able to read or exfiltrate personal files or system data.

Affected Systems

Apple macOS versions prior to macOS 26.3 are vulnerable. The issue was fixed in macOS 26.3 and later releases.

Risk and Exploitability

The vulnerability has a moderate CVSS score of 5.5, and the EPSS indicates a very low probability of exploitation (<1 %). It is not listed in the CISA KEV catalog, implying no publicly known widespread attacks. Likely exploitation would involve a locally running application that can bypass sandbox restrictions, suggesting a local, privilege‑escalation style vector rather than a remote attack.

Generated by OpenCVE AI on April 15, 2026 at 20:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to version 26.3 or later where the permission check has been removed.
  • Update all third‑party applications to their latest releases, ensuring they no longer rely on the removed code path.
  • Enforce stricter app sandboxing and location permissions in System Settings → Security & Privacy to limit access to protected system directories for untrusted applications.

Generated by OpenCVE AI on April 15, 2026 at 20:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Title macOS Permissions Issue Enabling Unauthorized Access to Protected User Data

Fri, 13 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Fri, 13 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Wed, 11 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3. An app may be able to access protected user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:22:23.470Z

Reserved: 2025-11-11T14:43:07.859Z

Link: CVE-2026-20623

cve-icon Vulnrichment

Updated: 2026-02-13T17:24:21.606Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-11T23:16:05.787

Modified: 2026-02-13T19:44:50.387

Link: CVE-2026-20623

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:00:09Z

Weaknesses