Apple Security Vulnerabilities (CVEs)

Track 1,277 security vulnerabilities affecting Apple products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

159 Critical
677 High
412 Medium
29 Low
🔔 Get Alerts for Apple
CVE-2026-20700 7.8

A memory corruption vulnerability in Apple operating systems allows attackers with memory write capability to execute arbitrary code. This affects wat...

Feb 11, 2026
CVE-2026-20678 5.5

This CVE describes an authorization vulnerability in iOS and iPadOS that allows malicious apps to bypass access controls and read sensitive user data....

Feb 11, 2026
CVE-2026-20681 3.3

This macOS vulnerability allows applications to access sensitive contact information that should be redacted in system logs. It affects macOS users ru...

Feb 11, 2026
CVE-2026-20677 9.0

This CVE describes a race condition vulnerability in Apple operating systems that allows shortcuts to bypass sandbox restrictions through improper han...

Feb 11, 2026
CVE-2026-20682 5.3

A logic flaw in iOS/iPadOS note management could allow attackers to access users' deleted notes. This affects users running vulnerable versions of iOS...

Feb 11, 2026
CVE-2026-20680 6.5

This CVE describes a macOS/iOS/iPadOS vulnerability where sandboxed applications can bypass security restrictions to access sensitive user data. The i...

Feb 11, 2026
CVE-2026-20666 5.5

This CVE describes an authorization vulnerability in macOS where an app could bypass intended restrictions and access sensitive user data. The issue a...

Feb 11, 2026
CVE-2026-20669 5.5

A path validation vulnerability in macOS allows malicious applications to bypass directory restrictions and access sensitive user data. This affects m...

Feb 11, 2026
CVE-2026-20673 5.3

A logic flaw in Apple's mail preview functionality allows remote content to load despite the 'Load remote content in messages' setting being disabled....

Feb 11, 2026
CVE-2026-20674 4.6

This CVE describes a privacy vulnerability in iOS/iPadOS where an attacker with physical access to a locked device could view sensitive user informati...

Feb 11, 2026
CVE-2026-20667 8.8

This CVE describes a sandbox escape vulnerability in Apple operating systems where a malicious app could bypass security restrictions designed to isol...

Feb 11, 2026
CVE-2026-20676 5.3

This vulnerability allows malicious websites to track users through Safari web extensions due to improper state management. It affects users of Apple'...

Feb 11, 2026
CVE-2026-20671 3.1

A logic vulnerability in Apple operating systems allows attackers in privileged network positions to intercept network traffic. This affects multiple ...

Feb 11, 2026
CVE-2026-20675 5.5

This CVE describes an image processing vulnerability in Apple operating systems where improper bounds checks could allow maliciously crafted images to...

Feb 11, 2026
CVE-2026-20663 3.3

This vulnerability allows malicious apps to enumerate a user's installed applications on iOS and iPadOS devices. It affects users running vulnerable v...

Feb 11, 2026
CVE-2026-20652 7.5

This CVE describes a memory handling vulnerability in Apple operating systems and Safari that could allow a remote attacker to cause denial-of-service...

Feb 11, 2026
CVE-2026-20653 5.5

A path validation vulnerability in Apple operating systems allows applications to access sensitive user data through improper directory path parsing. ...

Feb 11, 2026
CVE-2026-20660 7.5

This CVE describes a path handling vulnerability (CWE-22) in multiple Apple operating systems and Safari that allows a remote attacker to write arbitr...

Feb 11, 2026
CVE-2026-20662 4.6

This macOS vulnerability allows an attacker with physical access to a locked device to bypass authorization controls and view sensitive user informati...

Feb 11, 2026
CVE-2026-20654 5.5

This memory handling vulnerability in Apple operating systems allows an app to cause unexpected system termination (kernel panic/crash). All users run...

Feb 11, 2026
CVE-2026-20655 5.5

An authorization vulnerability in iOS and iPadOS allows attackers with physical access to a locked device to view sensitive user information. This aff...

Feb 11, 2026
CVE-2026-20656 3.3

A logic vulnerability in Apple's iOS, iPadOS, Safari, and macOS allows malicious applications to access a user's Safari browsing history without prope...

Feb 11, 2026
CVE-2026-20661 4.6

An authorization vulnerability in iOS and iPadOS allows attackers with physical access to a locked device to view sensitive user information. This aff...

Feb 11, 2026
CVE-2026-20658 7.8

A package validation vulnerability in macOS allows malicious applications to gain root privileges. This affects macOS systems running versions before ...

Feb 11, 2026
CVE-2026-20644 6.5

This memory handling vulnerability in Apple's WebKit browser engine allows processing malicious web content to cause unexpected process crashes. It af...

Feb 11, 2026
CVE-2026-20645 4.6

This CVE describes a user interface inconsistency vulnerability in Apple iOS and iPadOS that allows an attacker with physical access to a locked devic...

Feb 11, 2026
CVE-2026-20647 5.5

This macOS vulnerability allows applications to access sensitive user data due to insufficient data protection. It affects macOS Tahoe versions before...

Feb 11, 2026
CVE-2026-20648 5.5

This macOS vulnerability allows malicious applications to access notifications from other iCloud devices, potentially exposing sensitive information. ...

Feb 11, 2026
CVE-2026-20650 7.5

This CVE describes a Bluetooth denial-of-service vulnerability affecting multiple Apple operating systems. An attacker in a privileged network positio...

Feb 11, 2026
CVE-2026-20649 7.5

This CVE describes a logging vulnerability where sensitive user information was not properly redacted in system logs. Attackers with access to log fil...

Feb 11, 2026
CVE-2026-20646 3.3

A macOS logging vulnerability allows malicious applications to access sensitive location information that should have been redacted. This affects macO...

Feb 11, 2026
CVE-2026-20640 4.6

An attacker with physical access to an iPhone can take and view screenshots of sensitive data during iPhone Mirroring with a Mac. This vulnerability a...

Feb 11, 2026
CVE-2026-20641 7.1

This CVE describes a privacy vulnerability in Apple operating systems where an app could potentially identify what other apps a user has installed, ex...

Feb 11, 2026
CVE-2026-20642 2.4

An input validation vulnerability in iOS/iPadOS allows someone with physical access to a locked device to view photos from the lock screen. This affec...

Feb 11, 2026
CVE-2026-20626 7.8

This vulnerability allows a malicious application to gain root privileges on affected Apple devices. It affects macOS, iOS, iPadOS, and visionOS syste...

Feb 11, 2026
CVE-2026-20630 5.5

A permissions vulnerability in macOS allows applications to bypass intended restrictions and access protected user data. This affects macOS systems ru...

Feb 11, 2026
CVE-2026-20635 4.3

This CVE describes a memory handling vulnerability in Apple's WebKit browser engine that affects multiple Apple operating systems and Safari. Processi...

Feb 11, 2026
CVE-2026-20638 5.5

This vulnerability allows identifying information to leak to Live Caller ID app extensions even when those extensions are disabled. It affects iOS and...

Feb 11, 2026
CVE-2026-20627 5.5

This CVE describes an environment variable handling vulnerability in Apple operating systems that could allow malicious apps to access sensitive user ...

Feb 11, 2026
CVE-2026-20634 5.5

This memory handling vulnerability in Apple's image processing components allows disclosure of process memory when processing malicious images. It aff...

Feb 11, 2026
CVE-2026-20636 6.5

This memory handling vulnerability in Apple's WebKit browser engine allows processing malicious web content to cause unexpected process crashes. It af...

Feb 11, 2026
CVE-2026-20629 5.5

This macOS vulnerability allows applications to access sensitive user data through improper handling of temporary files. It affects macOS systems befo...

Feb 11, 2026
CVE-2026-20628 7.1

This CVE describes a sandbox escape vulnerability in multiple Apple operating systems where an app can bypass its security restrictions. It affects us...

Feb 11, 2026
CVE-2026-20625 5.5

A path validation vulnerability in macOS and visionOS allows applications to bypass directory restrictions and access sensitive user data. This affect...

Feb 11, 2026
CVE-2026-20619 5.5

This macOS vulnerability allows applications to access sensitive user data due to insufficient data redaction in logging. It affects macOS Sequoia bef...

Feb 11, 2026
CVE-2026-20623 5.5

A permissions vulnerability in macOS allowed applications to access protected user data they shouldn't have been able to access. This affects macOS sy...

Feb 11, 2026
CVE-2026-20624 5.5

This CVE describes an injection vulnerability in macOS that allows malicious applications to access sensitive user data. The issue affects macOS Sequo...

Feb 11, 2026
CVE-2026-20616 6.5

An out-of-bounds write vulnerability in USD file processing allows attackers to cause unexpected app termination or potentially execute arbitrary code...

Feb 11, 2026
CVE-2026-20620 7.7

This CVE describes an out-of-bounds read vulnerability in macOS kernel memory that could allow an attacker to cause system crashes or read sensitive k...

Feb 11, 2026
CVE-2026-20618 5.5

This macOS vulnerability allows applications to access sensitive user data through improper handling of temporary files. It affects macOS systems befo...

Feb 11, 2026

Why Monitor Apple Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 1,277+ known vulnerabilities affecting Apple products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Apple packages in under 60 seconds. No agents required - completely agentless scanning that works across Apple deployments.

Free vulnerability database: Access detailed information about every Apple CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Apple CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Apple CVEs Free