CVE-2026-20650
📋 TL;DR
This CVE describes a Bluetooth denial-of-service vulnerability affecting multiple Apple operating systems. An attacker in a privileged network position can send crafted Bluetooth packets to cause denial-of-service conditions. Affected systems include iOS, iPadOS, macOS, watchOS, tvOS, and visionOS versions before the specified patches.
💻 Affected Systems
- iOS
- iPadOS
- macOS
- watchOS
- tvOS
- visionOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Complete system unavailability or service disruption through Bluetooth interface, potentially affecting core device functionality.
Likely Case
Temporary service disruption or degraded performance on Bluetooth-dependent features until device restart or attacker stops sending packets.
If Mitigated
Minimal impact with proper network segmentation and Bluetooth access controls limiting attacker proximity.
🎯 Exploit Status
Requires attacker to be within Bluetooth range and have ability to craft/send malicious packets. No authentication bypass needed once in range.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3, iPadOS 26.3
Vendor Advisory: https://support.apple.com/en-us/126346
Restart Required: No
Instructions:
1. Go to Settings > General > Software Update on iOS/iPadOS/watchOS/tvOS/visionOS. 2. For macOS, go to System Settings > General > Software Update. 3. Install the available update to version 26.3 or later.
🔧 Temporary Workarounds
Disable Bluetooth when not needed
allTurn off Bluetooth to prevent exploitation via this vector
Settings > Bluetooth > Toggle Off
Restrict Bluetooth visibility
allSet Bluetooth to non-discoverable mode to reduce attack surface
Settings > Bluetooth > Visibility > Non-discoverable
🧯 If You Can't Patch
- Implement network segmentation to isolate Bluetooth traffic
- Deploy physical security controls to limit Bluetooth range access
🔍 How to Verify
Check if Vulnerable:
Check current OS version against affected versions list. If version is below 26.3 and Bluetooth is enabled, device is vulnerable.
Check Version:
iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac > macOS version. watchOS: Watch app > General > About > Version. tvOS: Settings > General > About > Version. visionOS: Settings > General > About > Version.
Verify Fix Applied:
Verify OS version is 26.3 or higher after applying update.
📡 Detection & Monitoring
Log Indicators:
- Unusual Bluetooth connection attempts
- Bluetooth service crashes or restarts
- System logs showing Bluetooth protocol errors
Network Indicators:
- Abnormal Bluetooth packet patterns
- Unexpected Bluetooth traffic from unknown devices
SIEM Query:
source="bluetooth" AND (event_type="error" OR event_type="crash") AND packet_size>normal_threshold