CVE-2026-28913
Received
Received - Intake
Memory Corruption in iOS and macOS Tahoe via Malicious Web Content
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: Apple Inc.
Description
Description
The issue was addressed with improved memory handling. This issue is fixed in iOS 26.5 and iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, watchOS 26.5. Processing maliciously crafted web content may lead to an unexpected process crash.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | ios | 26.5 |
| apple | ipad_os | 26.5 |
| apple | macos_tahoe | 26.5 |
| apple | tv_os | 26.5 |
| apple | watch_os | 26.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper memory handling when processing maliciously crafted web content. If exploited, it may cause an unexpected process crash on affected Apple operating systems.
How can this vulnerability impact me? :
The impact of this vulnerability is that processing specially crafted web content could cause an unexpected crash of a process on your device. This could lead to denial of service or disruption of normal device operation.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is addressed by updating to the fixed versions of the affected operating systems.
- Update iOS devices to iOS 26.5 or later.
- Update iPadOS devices to iPadOS 26.5 or later.
- Update macOS devices to macOS Tahoe 26.5 or later.
- Update tvOS devices to tvOS 26.5 or later.
- Update watchOS devices to watchOS 26.5 or later.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70