Ad

CVE-2026-28867

MEDIUM CVSS 3.1: 6.2 EPSS 0.02%
Updated Mar 27, 2026
Apple
Parameter Value
CVSS 6.2 (MEDIUM)
Affected Versions 15.0 — 26.4
Fixed In 18.7.7
Vendor Apple
Public PoC No

This issue was addressed with improved authentication. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to leak sensitive kernel state.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 9

Configuration From (including) Up to (excluding)
Apple Ipados
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
18.7.7
Apple Ipados
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
26.0 26.4
Apple Iphone_Os
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
18.7.7
Apple Iphone_Os
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
26.0 26.4
Apple Macos
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
15.0 15.7.5
Apple Macos
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
26.0 26.4
Apple Tvos
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
26.4
Apple Visionos
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
26.4
Apple Watchos
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
26.4