CVE-2026-20662

4.6 MEDIUM

📋 TL;DR

This macOS vulnerability allows an attacker with physical access to a locked device to bypass authorization controls and view sensitive user information. It affects macOS systems before specific security updates. Users with sensitive data on their Macs are at risk if devices are left unattended.

💻 Affected Systems

Products:
  • macOS
Versions: Versions before macOS Sequoia 15.7.4 and macOS Tahoe 26.3
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with lock screen enabled. Requires physical access to the device.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Physical attacker gains access to sensitive personal, financial, or corporate data stored on the device while it appears locked.

🟠

Likely Case

Unauthorized viewing of recent notifications, messages, or files accessible from lock screen without full system access.

🟢

If Mitigated

No data exposure due to proper physical security controls preventing unauthorized device access.

🌐 Internet-Facing: LOW - Requires physical access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Insider threat or physical theft scenarios could lead to data exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires physical device access and specific timing/conditions. No remote exploitation possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.7.4 or macOS Tahoe 26.3

Vendor Advisory: https://support.apple.com/en-us/126348

Restart Required: Yes

Instructions:

1. Open System Settings 2. Click General 3. Click Software Update 4. Install available updates 5. Restart when prompted

🔧 Temporary Workarounds

Enhanced Physical Security

all

Ensure devices are physically secured when unattended to prevent unauthorized access.

Immediate Locking

macOS

Configure shorter screen lock timeouts and require immediate password on wake.

🧯 If You Can't Patch

  • Implement strict physical security controls for all vulnerable devices
  • Enable FileVault encryption to protect data at rest

🔍 How to Verify

Check if Vulnerable:

Check macOS version in System Settings > General > About. If version is earlier than Sequoia 15.7.4 or Tahoe 26.3, device is vulnerable.

Check Version:

sw_vers

Verify Fix Applied:

Confirm macOS version shows Sequoia 15.7.4 or Tahoe 26.3 or later in System Settings > General > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual lock/unlock patterns
  • Failed authentication attempts followed by successful screen access

Network Indicators:

  • None - purely local physical attack

SIEM Query:

source="macOS" (event="screen_unlock" OR event="authentication") | stats count by user, device_id

🔗 References

📤 Share & Export