CVE-2026-28978
macOS Sandbox Escape via Malicious App
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | macos_sequoia | to 15.7.7 (inc) |
| apple | macos_sonoma | to 14.8.7 (inc) |
| apple | macos_tahoe | to 26.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a permissions issue in certain versions of macOS (Sequoia, Sonoma, Tahoe) that was addressed by adding additional restrictions. It allows a malicious application to potentially break out of its sandbox, which is a security mechanism designed to isolate apps and limit their access to system resources.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow a malicious app to escape its sandbox environment, potentially gaining unauthorized access to system resources or user data that should be protected. This could lead to unauthorized actions or data breaches on affected macOS systems.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, and macOS Tahoe 26.5.
To mitigate this vulnerability, you should update your macOS system to one of these fixed versions as soon as possible.