← Back to CVEs
CVE-2026-20611
HIGH7.8
Description
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published2/11/2026
Last Modified3/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
apple:ipadosapple:iphone_osapple:macosapple:tvosapple:visionosapple:watchos
Weaknesses (CWE)
CWE-125
References
https://support.apple.com/en-us/126346(product-security@apple.com)
https://support.apple.com/en-us/126347(product-security@apple.com)
https://support.apple.com/en-us/126348(product-security@apple.com)
https://support.apple.com/en-us/126349(product-security@apple.com)
https://support.apple.com/en-us/126350(product-security@apple.com)
https://support.apple.com/en-us/126351(product-security@apple.com)
https://support.apple.com/en-us/126352(product-security@apple.com)
https://support.apple.com/en-us/126353(product-security@apple.com)
https://www.zerodayinitiative.com/advisories/ZDI-26-173/(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.