Description
This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, macOS Sonoma 14.8.5, macOS Tahoe 26.3, macOS Tahoe 26.4. An app may be able to access user-sensitive data.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Exposure
Action: Patch Update
AI Analysis

Impact

The flaw arises from insufficient validation of symbolic links during local file access on Apple operating systems. When an application opens a file, the system may follow a symlink that points outside the app’s defined sandbox or intended directories without enforcing proper checks. This allows a malicious or tampered application to read arbitrary files that contain personal or sensitive information, creating a path for data leakage. Consequently, the vulnerability presents a data exposure risk that can be leveraged by any app capable of manipulating file‑access decisions or supplying crafted data.

Affected Systems

Apple iOS and iPadOS versions earlier than 26.3, macOS Sequoia earlier than 15.7.4, macOS Sonoma earlier than 14.8.4, and macOS Tahoe earlier than 26.3 are susceptible. All previous releases of these operating systems include the vulnerable symlink handling logic. Users on those versions should verify the current system release and apply updates as available.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score below 1% suggests a low probability of immediate exploitation in the wild. The flaw is not listed in the known exploited vulnerabilities catalog, implying no widespread or confirmed attacks. Exploitation would generally require local or privileged access, such as a malicious application installed on the device. Therefore, the threat vector is most likely local, and the impact is limited to data exposure rather than remote code execution.

Generated by OpenCVE AI on March 27, 2026 at 10:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest iOS 26.3 or iPadOS 26.3 update to restore proper symlink validation.
  • Install macOS Sequoia 15.7.4 or 15.7.5, Sonoma 14.8.4 or 14.8.5, or Tahoe 26.3 or 26.4 updates to patch the vulnerability.
  • Confirm that the installed version matches the latest update by checking the system version in Settings on iOS or About This Mac on macOS.
  • Avoid installing or running untrusted third‑party applications that could exploit the flaw, and only download apps from trusted outlets.
  • If an update is not yet available for your device, limit potential exposure by using the system’s built‑in sandboxing features to restrict file access for new applications, and consider disabling automatic installs of unverified apps.

Generated by OpenCVE AI on March 27, 2026 at 10:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title Symbolic Link Handling Vulnerability Potentially Allows App-Driven Data Exposure on Apple Operating Systems

Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Title Symlink Handling Enables App to Access User Sensitive Data
Weaknesses CWE-200

Thu, 26 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
Weaknesses CWE-59
CWE-61
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Title Symlink Handling Enables App to Access User Sensitive Data
Weaknesses CWE-200

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Title Symlink Exploit Enables Apps to Access Sensitive User Data
Weaknesses CWE-200
CWE-22

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Symlink Exploit Enables Apps to Access Sensitive User Data
Weaknesses CWE-200
CWE-22

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Vendors & Products Apple
Apple ios And Ipados
Apple macos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, macOS Sonoma 14.8.5, macOS Tahoe 26.3, macOS Tahoe 26.4. An app may be able to access user-sensitive data.
References

Subscriptions

Apple Ios And Ipados Ipados Iphone Os Macos
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:14:54.511Z

Reserved: 2025-11-11T14:43:07.876Z

Link: CVE-2026-20694

cve-icon Vulnrichment

Updated: 2026-03-26T19:23:17.407Z

cve-icon NVD

Status : Modified

Published: 2026-03-25T01:17:06.217

Modified: 2026-03-26T20:16:09.393

Link: CVE-2026-20694

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T15:47:57Z

Weaknesses