CVE-2026-20645
📋 TL;DR
This CVE describes a user interface inconsistency vulnerability in Apple iOS and iPadOS that allows an attacker with physical access to a locked device to potentially view sensitive user information. The issue affects users of iOS and iPadOS devices who haven't updated to the patched versions. This is a physical access vulnerability requiring the attacker to handle the locked device.
💻 Affected Systems
- iPhone
- iPad
📦 What is this software?
Ipados by Apple
Ipados by Apple
⚠️ Risk & Real-World Impact
Worst Case
An attacker with brief physical access to a locked device could view sensitive information such as notifications, messages, or personal data that should be hidden when the device is locked.
Likely Case
Opportunistic attackers (like thieves or unauthorized personnel) could briefly view notifications or limited information on a locked device they physically possess.
If Mitigated
With proper physical security controls and device passcodes, the impact is minimal as the attacker needs both physical access and the device to be in a vulnerable state.
🎯 Exploit Status
Exploitation requires physical access to a locked device and specific UI manipulation. No authentication bypass occurs - the device remains locked but may display information that should be hidden.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 26.3, iPadOS 26.3, iOS 18.7.5, iPadOS 18.7.5
Vendor Advisory: https://support.apple.com/en-us/126346
Restart Required: No
Instructions:
1. Open Settings app. 2. Tap General. 3. Tap Software Update. 4. Install available update. 5. The device will restart automatically during installation.
🔧 Temporary Workarounds
Enable Stronger Lock Screen Privacy
allConfigure device to hide sensitive information on lock screen
Settings > Notifications > Show Previews > When Unlocked
Settings > Face ID & Passcode/Touch ID & Passcode > disable lock screen access for sensitive features
Enable Auto-Lock with Short Timeout
allReduce window for physical access exploitation
Settings > Display & Brightness > Auto-Lock > 30 seconds or less
🧯 If You Can't Patch
- Implement strict physical security controls for devices
- Enable Find My iPhone and remote wipe capabilities
🔍 How to Verify
Check if Vulnerable:
Check iOS/iPadOS version in Settings > General > About > Version. If version is earlier than iOS 26.3, iPadOS 26.3, iOS 18.7.5, or iPadOS 18.7.5, the device is vulnerable.
Check Version:
Settings > General > About > Version (no CLI command available on iOS)
Verify Fix Applied:
After updating, verify version shows iOS 26.3, iPadOS 26.3, iOS 18.7.5, or iPadOS 18.7.5 or later in Settings > General > About > Version.
📡 Detection & Monitoring
Log Indicators:
- No specific log indicators - this is a UI state issue
Network Indicators:
- No network indicators - physical access required
SIEM Query:
Not applicable - physical access vulnerability with no network component