CVE-2026-20645

4.6 MEDIUM

📋 TL;DR

This CVE describes a user interface inconsistency vulnerability in Apple iOS and iPadOS that allows an attacker with physical access to a locked device to potentially view sensitive user information. The issue affects users of iOS and iPadOS devices who haven't updated to the patched versions. This is a physical access vulnerability requiring the attacker to handle the locked device.

💻 Affected Systems

Products:
  • iPhone
  • iPad
Versions: iOS and iPadOS versions prior to iOS 26.3, iPadOS 26.3, iOS 18.7.5, and iPadOS 18.7.5
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard configurations of affected iOS/iPadOS versions are vulnerable. The vulnerability manifests as a UI state management issue when the device is locked.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with brief physical access to a locked device could view sensitive information such as notifications, messages, or personal data that should be hidden when the device is locked.

🟠

Likely Case

Opportunistic attackers (like thieves or unauthorized personnel) could briefly view notifications or limited information on a locked device they physically possess.

🟢

If Mitigated

With proper physical security controls and device passcodes, the impact is minimal as the attacker needs both physical access and the device to be in a vulnerable state.

🌐 Internet-Facing: LOW - This vulnerability requires physical device access, not network exploitation.
🏢 Internal Only: MEDIUM - Physical device theft or unauthorized access in workplaces could lead to information disclosure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access to a locked device and specific UI manipulation. No authentication bypass occurs - the device remains locked but may display information that should be hidden.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 26.3, iPadOS 26.3, iOS 18.7.5, iPadOS 18.7.5

Vendor Advisory: https://support.apple.com/en-us/126346

Restart Required: No

Instructions:

1. Open Settings app. 2. Tap General. 3. Tap Software Update. 4. Install available update. 5. The device will restart automatically during installation.

🔧 Temporary Workarounds

Enable Stronger Lock Screen Privacy

all

Configure device to hide sensitive information on lock screen

Settings > Notifications > Show Previews > When Unlocked
Settings > Face ID & Passcode/Touch ID & Passcode > disable lock screen access for sensitive features

Enable Auto-Lock with Short Timeout

all

Reduce window for physical access exploitation

Settings > Display & Brightness > Auto-Lock > 30 seconds or less

🧯 If You Can't Patch

  • Implement strict physical security controls for devices
  • Enable Find My iPhone and remote wipe capabilities

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About > Version. If version is earlier than iOS 26.3, iPadOS 26.3, iOS 18.7.5, or iPadOS 18.7.5, the device is vulnerable.

Check Version:

Settings > General > About > Version (no CLI command available on iOS)

Verify Fix Applied:

After updating, verify version shows iOS 26.3, iPadOS 26.3, iOS 18.7.5, or iPadOS 18.7.5 or later in Settings > General > About > Version.

📡 Detection & Monitoring

Log Indicators:

  • No specific log indicators - this is a UI state issue

Network Indicators:

  • No network indicators - physical access required

SIEM Query:

Not applicable - physical access vulnerability with no network component

🔗 References

📤 Share & Export