PatchSiren cyber security CVE debrief
CVE-2026-20684 Apple CVE debrief
Apple addressed a permissions issue in macOS Tahoe 26.4 that could allow an app to bypass Gatekeeper checks. The available advisory data points to a low-severity issue with limited integrity impact, but it is still worth prioritizing on systems running macOS Tahoe 26.0 through 26.3 because Gatekeeper is part of the software trust chain.
- Vendor
- Apple
- Product
- CVE-2026-20684
- CVSS
- LOW 3.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-25
- Original CVE updated
- 2026-05-10
- Advisory published
- 2026-03-25
- Advisory updated
- 2026-05-10
Who should care
Administrators and users running macOS Tahoe 26.0 through 26.3, especially environments that rely on Gatekeeper to screen application launches and reduce exposure to untrusted software.
Technical summary
According to NVD’s modified record and the linked Apple advisory, CVE-2026-20684 is a permissions issue in macOS Tahoe that was fixed in macOS Tahoe 26.4. NVD maps the vulnerable range to macOS 26.0 through before 26.4 and assigns CVSS v3.1 vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N, indicating local conditions, required user interaction, and limited integrity impact.
Defensive priority
Low overall severity, but moderate priority for hosts on macOS Tahoe 26.0-26.3 because the issue affects a core trust-control path and is fixed in a specific maintenance release.
Recommended defensive actions
- Update macOS Tahoe systems to 26.4 or later.
- Prioritize assets still on macOS Tahoe 26.0-26.3 for remediation.
- Continue standard software trust controls and avoid approving untrusted apps unless necessary.
- Track Apple’s vendor advisory for any follow-up guidance or release note updates.
Evidence notes
The NVD modified record dated 2026-05-10 cites Apple support note 126794 and lists macOS vulnerable from 26.0 through before 26.4. The record includes CVSS v3.1 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N and does not show a CISA KEV entry in the supplied corpus.
Official resources
-
CVE-2026-20684 CVE record
CVE.org
-
CVE-2026-20684 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Release Notes, Vendor Advisory
Publicly disclosed on 2026-03-25 via the CVE/NVD record and Apple vendor reference; the NVD entry was modified on 2026-05-10.