Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Apple Patches Exploited Notification Flaw, (Thu, Apr 23rd)

0
Medium
Exploitiosdos
Published: Thu Apr 23 2026 (04/23/2026, 10:18:30 UTC)
Source: SANS ISC Handlers Diary

Description

Apple released iOS/iPadOS updates 26. 4. 2 and 18. 7. 8 to fix a Notification Services vulnerability identified as CVE-2026-28950. The flaw caused notifications marked for deletion to be unexpectedly retained on the device, potentially exposing sensitive information displayed in notifications. This issue was related to a logging problem addressed by improved data redaction. Although Apple did not officially mark this vulnerability as exploited, reports indicate the FBI leveraged it to extract Signal message contents from a seized device. Signal notifications can include sender usernames and message snippets, which were not properly deleted due to this flaw. The vulnerability arises from the use of Apple's Notification Services framework, which may not align with the threat model of secure messaging apps like Signal.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/23/2026, 10:23:10 UTC

Technical Analysis

CVE-2026-28950 is a vulnerability in Apple's Notification Services framework affecting iOS/iPadOS. It causes notifications marked for deletion to remain on the device, potentially exposing sensitive notification content. The issue was a logging-related flaw that Apple fixed by improving data redaction in iOS/iPadOS versions 26.4.2 and 18.7.8. While Apple did not confirm exploitation, external reports indicate law enforcement used this vulnerability to extract Signal message data from a device. The vulnerability highlights risks when secure messaging apps rely on OS notification frameworks not designed for their security requirements.

Potential Impact

Notifications that should have been deleted remained accessible on affected devices, potentially exposing sensitive information such as sender usernames and message content from secure messaging apps like Signal. This could undermine the confidentiality of communications on the device. The vulnerability was reportedly exploited by the FBI in a criminal investigation to extract Signal messages. However, Apple has not officially confirmed exploitation in the wild.

Mitigation Recommendations

Apple has released official patches in iOS/iPadOS versions 26.4.2 and 18.7.8 that address this vulnerability by improving data redaction in Notification Services. Users and administrators should apply these updates promptly to remediate the issue. No additional mitigation steps are indicated by the vendor advisory.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32922","fetched":true,"fetchedAt":"2026-04-23T10:23:05.756Z","wordCount":346}

Threat ID: 69e9f30987115cfb68fefd05

Added to database: 4/23/2026, 10:23:05 AM

Last enriched: 4/23/2026, 10:23:10 AM

Last updated: 4/24/2026, 6:05:33 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses