CVE-2026-20650

7.5 HIGH

📋 TL;DR

This CVE describes a Bluetooth denial-of-service vulnerability affecting multiple Apple operating systems. An attacker in a privileged network position can send crafted Bluetooth packets to cause denial-of-service conditions. Affected systems include iOS, iPadOS, macOS, watchOS, tvOS, and visionOS versions before the specified patches.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
  • watchOS
  • tvOS
  • visionOS
Versions: Versions before 26.3
Operating Systems: Apple operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with Bluetooth enabled and running affected versions are vulnerable by default.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability or service disruption through Bluetooth interface, potentially affecting core device functionality.

🟠

Likely Case

Temporary service disruption or degraded performance on Bluetooth-dependent features until device restart or attacker stops sending packets.

🟢

If Mitigated

Minimal impact with proper network segmentation and Bluetooth access controls limiting attacker proximity.

🌐 Internet-Facing: LOW - Requires Bluetooth proximity, not internet connectivity.
🏢 Internal Only: MEDIUM - Attack requires physical proximity or network access to Bluetooth range, making internal environments with unrestricted Bluetooth more vulnerable.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to be within Bluetooth range and have ability to craft/send malicious packets. No authentication bypass needed once in range.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3, iPadOS 26.3

Vendor Advisory: https://support.apple.com/en-us/126346

Restart Required: No

Instructions:

1. Go to Settings > General > Software Update on iOS/iPadOS/watchOS/tvOS/visionOS. 2. For macOS, go to System Settings > General > Software Update. 3. Install the available update to version 26.3 or later.

🔧 Temporary Workarounds

Disable Bluetooth when not needed

all

Turn off Bluetooth to prevent exploitation via this vector

Settings > Bluetooth > Toggle Off

Restrict Bluetooth visibility

all

Set Bluetooth to non-discoverable mode to reduce attack surface

Settings > Bluetooth > Visibility > Non-discoverable

🧯 If You Can't Patch

  • Implement network segmentation to isolate Bluetooth traffic
  • Deploy physical security controls to limit Bluetooth range access

🔍 How to Verify

Check if Vulnerable:

Check current OS version against affected versions list. If version is below 26.3 and Bluetooth is enabled, device is vulnerable.

Check Version:

iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac > macOS version. watchOS: Watch app > General > About > Version. tvOS: Settings > General > About > Version. visionOS: Settings > General > About > Version.

Verify Fix Applied:

Verify OS version is 26.3 or higher after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth connection attempts
  • Bluetooth service crashes or restarts
  • System logs showing Bluetooth protocol errors

Network Indicators:

  • Abnormal Bluetooth packet patterns
  • Unexpected Bluetooth traffic from unknown devices

SIEM Query:

source="bluetooth" AND (event_type="error" OR event_type="crash") AND packet_size>normal_threshold

🔗 References

📤 Share & Export