CVE-2026-28846
Buffer Overflow in Apple iOS and iPadOS
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ios | 18.7.9 |
| apple | ipados | 18.7.9 |
| apple | macos_sequoia | 15.7.7 |
| apple | macos_sonoma | 14.8.7 |
| apple | macos_tahoe | 26.5 |
| apple | tvos | 26.5 |
| apple | visionos | 26.5 |
| apple | watchos | 26.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow issue that was addressed by improving bounds checking in affected Apple operating systems.
A buffer overflow occurs when a program writes more data to a buffer than it can hold, which can lead to unexpected behavior.
In this case, a remote attacker may be able to exploit this vulnerability to cause an application to terminate unexpectedly.
How can this vulnerability impact me? :
The primary impact of this vulnerability is that a remote attacker could cause an application to terminate unexpectedly.
This could lead to denial of service or disruption of normal application functionality on affected Apple devices.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Apple devices to the fixed versions of the operating systems as soon as possible.
- Update iOS devices to iOS 18.7.9 or iOS 26.5.
- Update iPadOS devices to iPadOS 18.7.9 or iPadOS 26.5.
- Update macOS devices to macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, or macOS Tahoe 26.5.
- Update tvOS devices to tvOS 26.5.
- Update visionOS devices to visionOS 26.5.
- Update watchOS devices to watchOS 26.5.