CVE-2026-28978
Received Received - Intake
macOS Sandbox Escape via Malicious App

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: Apple Inc.

Description
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5. A malicious app may be able to break out of its sandbox.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-12
AI Q&A
2026-05-12
EPSS Evaluated
N/A
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
apple macos_sequoia to 15.7.7 (inc)
apple macos_sonoma to 14.8.7 (inc)
apple macos_tahoe to 26.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a permissions issue in certain versions of macOS (Sequoia, Sonoma, Tahoe) that was addressed by adding additional restrictions. It allows a malicious application to potentially break out of its sandbox, which is a security mechanism designed to isolate apps and limit their access to system resources.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow a malicious app to escape its sandbox environment, potentially gaining unauthorized access to system resources or user data that should be protected. This could lead to unauthorized actions or data breaches on affected macOS systems.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, and macOS Tahoe 26.5.

To mitigate this vulnerability, you should update your macOS system to one of these fixed versions as soon as possible.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart