CVE-2026-20641
📋 TL;DR
This CVE describes a privacy vulnerability in Apple operating systems where an app could potentially identify what other apps a user has installed, exposing sensitive user data. It affects multiple Apple platforms including iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. The issue has been addressed through improved checks in updated versions.
💻 Affected Systems
- iOS
- iPadOS
- macOS
- watchOS
- tvOS
- visionOS
📦 What is this software?
Ipados by Apple
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
An attacker could profile a user's app usage patterns, potentially leading to targeted attacks, privacy violations, or data leakage about personal interests and habits.
Likely Case
Malicious apps could gather information about installed apps for advertising profiling, competitive intelligence, or minor privacy intrusions without direct data theft.
If Mitigated
With proper controls like app sandboxing and updated systems, the risk is limited to minimal privacy exposure with no direct system compromise.
🎯 Exploit Status
Exploitation requires a malicious app to be installed on the target device, leveraging improper checks to access app installation data.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5, iPadOS 18.7.5, visionOS 26.3, iOS 26.3, iPadOS 26.3
Vendor Advisory: https://support.apple.com/en-us/126346
Restart Required: No
Instructions:
1. Open Settings on the device. 2. Go to General > Software Update. 3. Download and install the latest available update. 4. Ensure the device is connected to power and Wi-Fi during the update.
🔧 Temporary Workarounds
Restrict App Installations
allLimit app installations to trusted sources only, such as the official App Store, to reduce the risk of malicious apps exploiting this vulnerability.
🧯 If You Can't Patch
- Implement strict app vetting policies to prevent installation of untrusted or suspicious applications.
- Use mobile device management (MDM) solutions to enforce security controls and monitor for unusual app behavior.
🔍 How to Verify
Check if Vulnerable:
Check the current OS version against the patched versions listed in the affected systems section.
Check Version:
On iOS/iPadOS: Settings > General > About > Version. On macOS: Apple menu > About This Mac > macOS version.
Verify Fix Applied:
Confirm that the OS version matches or exceeds the patched versions after updating.
📡 Detection & Monitoring
Log Indicators:
- Unusual app behavior logs indicating attempts to access system app lists or privacy-related APIs without proper authorization.
Network Indicators:
- No direct network indicators as this is a local privacy issue.
SIEM Query:
Search for events related to app installation checks or privacy API accesses from untrusted apps on Apple devices.
🔗 References
- https://support.apple.com/en-us/126346
- https://support.apple.com/en-us/126347
- https://support.apple.com/en-us/126348
- https://support.apple.com/en-us/126349
- https://support.apple.com/en-us/126350
- https://support.apple.com/en-us/126351
- https://support.apple.com/en-us/126352
- https://support.apple.com/en-us/126353