CVE-2026-20661

4.6 MEDIUM

📋 TL;DR

An authorization vulnerability in iOS and iPadOS allows attackers with physical access to a locked device to view sensitive user information. This affects users running vulnerable versions of iOS/iPadOS who leave their devices unattended while locked. The issue was addressed through improved state management in Apple's security updates.

💻 Affected Systems

Products:
  • iPhone
  • iPad
Versions: iOS/iPadOS versions prior to 26.3 and 18.7.5
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected iOS/iPadOS versions are vulnerable by default. Physical access to locked device required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains access to sensitive personal data, financial information, private messages, or authentication credentials stored on the device.

🟠

Likely Case

Unauthorized viewing of recent notifications, photos, or app data accessible from lock screen without full device unlock.

🟢

If Mitigated

No data exposure if device is kept in secure location and proper physical security controls are enforced.

🌐 Internet-Facing: LOW - This is a local physical access vulnerability requiring attacker to handle the device directly.
🏢 Internal Only: MEDIUM - In environments where devices may be left unattended (offices, public spaces), physical access could lead to data exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires physical device access and specific timing/conditions during lock screen state transitions. No authentication bypass to full device access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 26.3, iPadOS 26.3, iOS 18.7.5, iPadOS 18.7.5

Vendor Advisory: https://support.apple.com/en-us/126346

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Tap General > Software Update. 3. Download and install available update. 4. Device will restart automatically.

🔧 Temporary Workarounds

Enable Stronger Lock Screen Restrictions

iOS/iPadOS

Configure device to hide sensitive information from lock screen and require immediate passcode

Settings > Face ID & Passcode > Turn off 'Today View and Search', 'Notification Center', 'Control Center' when locked

Reduce Auto-Lock Time

iOS/iPadOS

Set shorter auto-lock timeout to minimize window of opportunity

Settings > Display & Brightness > Auto-Lock > Set to 30 seconds or 1 minute

🧯 If You Can't Patch

  • Never leave devices unattended in public or unsecured areas
  • Enable Find My iPhone remote wipe capability and configure strong passcodes

🔍 How to Verify

Check if Vulnerable:

Check Settings > General > About > Version. If version is earlier than 26.3 or 18.7.5, device is vulnerable.

Check Version:

Settings > General > About > Version

Verify Fix Applied:

After update, verify Settings > General > About > Version shows 26.3 or 18.7.5 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual lock/unlock patterns in device logs
  • Multiple failed authentication attempts followed by successful screen access

Network Indicators:

  • None - this is a local physical access vulnerability

SIEM Query:

Device logs showing lock screen state changes without corresponding successful authentication

🔗 References

📤 Share & Export