CVE-2026-20674 Overview
A privacy vulnerability has been identified in Apple iOS and iPadOS that allows sensitive user information to be exposed when an attacker has physical access to a locked device. Apple addressed this issue by removing the sensitive data that was improperly accessible. This vulnerability affects the lock screen security mechanisms that should protect user data when a device is in a locked state.
Critical Impact
An attacker with physical access to a locked iOS or iPadOS device can view sensitive user information without authentication, bypassing lock screen protections.
Affected Products
- Apple iOS (versions prior to 26.3)
- Apple iPadOS (versions prior to 26.3)
Discovery Timeline
- 2026-02-11 - CVE-2026-20674 published to NVD
- 2026-02-12 - Last updated in NVD database
Technical Details for CVE-2026-20674
Vulnerability Analysis
This vulnerability represents a sensitive data exposure flaw in Apple's iOS and iPadOS operating systems. The core issue stems from sensitive user information being accessible through the device interface even when the device is in a locked state. Apple's lock screen is designed to prevent unauthorized access to user data, but this vulnerability circumvented those protections, allowing physical attackers to view information that should have been restricted.
The attack requires physical proximity and direct access to the target device, which limits the attack surface compared to remotely exploitable vulnerabilities. However, in scenarios such as device theft, lost devices, or temporary unattended access (e.g., at a workplace or public location), this vulnerability poses a significant privacy risk.
Root Cause
The root cause of this vulnerability is the improper handling of sensitive data in the device's user interface layer. Certain user information was exposed through a mechanism accessible from the lock screen, bypassing the authentication requirements that should protect such data. Apple resolved the issue by removing the sensitive data from the accessible path, ensuring that authentication is required before viewing this information.
Attack Vector
The attack vector requires physical access to a target device. An attacker must have the device in hand while it is locked. From this position, the attacker can exploit the vulnerability to view sensitive user information without needing to unlock the device or know the user's passcode. This type of attack is particularly concerning in scenarios involving:
- Stolen devices
- Temporarily unattended devices
- Social engineering to gain brief physical access
- Corporate environments where devices may be left at workstations
The vulnerability does not require any user interaction beyond the victim leaving their device accessible to the attacker.
Detection Methods for CVE-2026-20674
Indicators of Compromise
- Review device access logs for suspicious physical handling patterns or repeated lock screen interactions
- Monitor for unauthorized attempts to access device information while locked
- Check for evidence of device tampering or unusual wear patterns suggesting unauthorized physical access
Detection Strategies
- Implement mobile device management (MDM) solutions to monitor device status and detect anomalous access patterns
- Enable device logging to capture lock screen interaction events
- Use SentinelOne's mobile threat defense capabilities to monitor for exploitation attempts on managed devices
Monitoring Recommendations
- Maintain an inventory of all iOS and iPadOS devices and their current firmware versions
- Monitor for devices running vulnerable firmware versions (prior to iOS/iPadOS 26.3)
- Implement alerts for devices that have not been updated within your organization's patch window
How to Mitigate CVE-2026-20674
Immediate Actions Required
- Update all iOS devices to version 26.3 or later immediately
- Update all iPadOS devices to version 26.3 or later immediately
- Review physical security policies for mobile devices within your organization
- Educate users about the importance of keeping devices secured and not leaving them unattended
Patch Information
Apple has released iOS 26.3 and iPadOS 26.3 to address this vulnerability. The fix removes the sensitive data from the accessible path, ensuring it cannot be viewed from the lock screen without proper authentication. Organizations should prioritize deploying this update to all managed Apple devices.
For detailed patch information, refer to the Apple Support Article.
Workarounds
- Ensure devices are never left unattended in public or semi-public spaces
- Consider using device tethers or secure storage when devices must be left temporarily
- Enable "Find My" features to remotely lock or wipe devices if physical compromise is suspected
- Review and minimize the amount of sensitive information stored on mobile devices
# Verify iOS/iPadOS version on managed devices
# Using Apple Configurator or MDM solution, query device versions
# Ensure all devices report version 26.3 or later
# Example MDM compliance check (syntax varies by vendor)
# Filter: os_version < 26.3
# Action: Flag for immediate update
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


