Description
An authorization issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.
Published: 2026-02-11
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to sensitive user data
Action: Patch
AI Analysis

Impact

An authorization flaw due to improper state management allows a local application to gain unauthorized access to sensitive user data. The vulnerability, classified as privilege escalation, can lead to confidentiality breaches by enabling apps to read or modify data that should be restricted to the user.

Affected Systems

Apple’s macOS Tahoe platform is affected when running versions prior to the 26.3 update, which contains the fix for the state‑management issue. Users on earlier releases of macOS Tahoe therefore remain vulnerable.

Risk and Exploitability

The vulnerability carries a moderate CVSS score of 5.5 and an EPSS score below 1 %, indicating a low probability of exploitation. It is not listed in the CISA Known Exploited Vulnerabilities catalog. It is inferred that the most likely attack vector is local; based on the description, an application running with user privileges could exploit the weakened state controls to reach protected data. Because the flaw does not lead to remote code execution or system compromise, the overall risk is low but the impact on user privacy warrants remediation.

Generated by OpenCVE AI on April 16, 2026 at 00:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the macOS 26.3 update or newer to resolve the state‑management flaw.
  • Restart the computer to fully activate the updated security controls.
  • Check System Settings > Privacy & Security and revoke any unnecessary application permissions that may expose sensitive data.

Generated by OpenCVE AI on April 16, 2026 at 00:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 16 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Title macOS Authorization Flaw Enabling Apps to Read Sensitive Data

Thu, 12 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Thu, 12 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-285
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Wed, 11 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description An authorization issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:10:17.415Z

Reserved: 2025-11-11T14:43:07.866Z

Link: CVE-2026-20666

cve-icon Vulnrichment

Updated: 2026-02-12T16:56:47.689Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-11T23:16:09.020

Modified: 2026-02-12T18:27:31.410

Link: CVE-2026-20666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:00:19Z

Weaknesses