CVE-2026-20700 عالية / High CVSS 7.8

VULNERABILITY BRIEF

CVE-2026-20700

المصدر الرسمي: NVD

مستوى الخطورة

عالية (High)

درجة CVSS

7.8

حالة الاستغلال KEV

مستغلة فعليًا

تاريخ النشر

2026-02-12

وصف الثغرة

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.

الأثر المحتمل

لم تتوفر تفاصيل إضافية في المصدر الرسمي.

التوصيات والمعالجة

لم تتوفر تفاصيل إضافية في المصدر الرسمي.\nراجع روابط المصدر الرسمية.

حالة الاستغلال (KEV)

هذه الثغرة مدرجة ضمن الثغرات المستغلة فعليًا (CISA KEV).

تاريخ الإدراج: Feb. 12, 2026

تاريخ الاستحقاق: March 5, 2026

المراجع الرسمية

English Technical Fields

Description: A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

KEV Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.