CVE-2026-28897
Buffer Overflow in Apple iOS and macOS
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ios | 18.7.9 |
| apple | ipados | 18.7.9 |
| apple | macos_sequoia | 15.7.7 |
| apple | macos_sonoma | 14.8.7 |
| apple | macos_tahoe | 26.5 |
| apple | tvos | 26.5 |
| apple | visionos | 26.5 |
| apple | watchos | 26.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow issue that was addressed by improving input validation in various Apple operating systems. A buffer overflow occurs when more data is written to a buffer than it can hold, which can lead to unexpected behavior.
In this case, a local user could exploit the vulnerability to cause the system to terminate unexpectedly or to read sensitive kernel memory.
How can this vulnerability impact me? :
The impact of this vulnerability includes the possibility for a local user to cause unexpected system termination, which could lead to denial of service or system instability.
Additionally, the vulnerability could allow a local user to read kernel memory, potentially exposing sensitive information or compromising system security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Apple devices to the fixed versions of the operating systems: iOS 18.7.9 or 26.5, iPadOS 18.7.9 or 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, or watchOS 26.5.