Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28832: An app may be able to disclose kernel memory in Apple macOS

0
High
VulnerabilityCVE-2026-28832cvecve-2026-28832
Published: Wed Mar 25 2026 (03/25/2026, 00:32:42 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to disclose kernel memory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:08:25 UTC

Technical Analysis

CVE-2026-28832 is a vulnerability in Apple macOS involving an out-of-bounds read condition due to inadequate bounds checking in kernel memory handling. This flaw allows a local application to read beyond the intended memory boundaries, potentially exposing sensitive kernel memory contents. The vulnerability is classified under CWE-125 (Out-of-bounds Read) and affects multiple recent macOS versions, including Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4. The CVSS v3.1 score is 8.4, indicating high severity, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an unprivileged local application can exploit the vulnerability without user interaction to disclose kernel memory, potentially leading to information leakage, privilege escalation, or system instability. Apple has fixed the issue by implementing improved bounds checking to prevent out-of-bounds reads. No public exploits are known at this time, but the vulnerability's nature makes it a critical risk for macOS users. The vulnerability's presence in the kernel memory space means that attackers could leverage disclosed information to facilitate further attacks or bypass security mechanisms. The affected versions are recent, indicating that users running up-to-date macOS versions should apply patches promptly to mitigate risk.

Potential Impact

The vulnerability allows local applications to read sensitive kernel memory, which can lead to significant confidentiality breaches by exposing sensitive data such as cryptographic keys, passwords, or system internals. This information disclosure can be leveraged to bypass security controls, escalate privileges, or destabilize the system, impacting integrity and availability. Since no privileges or user interaction are required, exploitation is relatively straightforward for local attackers, increasing the risk of widespread abuse. Organizations relying on macOS for critical operations, especially those handling sensitive data or intellectual property, face risks of data leakage and potential system compromise. The vulnerability could also undermine trust in macOS security, affecting enterprise deployments and user confidence. Although no known exploits exist currently, the high CVSS score and nature of the flaw suggest attackers may develop exploits, increasing urgency for mitigation. The impact extends to any environment where macOS is used, including corporate, government, and personal devices, potentially affecting confidentiality and operational stability.

Mitigation Recommendations

1. Immediately apply the security updates released by Apple for macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 to ensure the vulnerability is patched. 2. Restrict local application execution privileges to trusted software only, minimizing the risk of malicious apps exploiting the vulnerability. 3. Employ endpoint detection and response (EDR) solutions capable of monitoring unusual local process behavior that might indicate attempts to access kernel memory. 4. Implement strict application whitelisting and sandboxing to limit the ability of untrusted applications to execute or access sensitive system components. 5. Regularly audit and monitor system logs for anomalous activity related to kernel memory access. 6. Educate users and administrators about the importance of applying patches promptly and avoiding installation of untrusted software. 7. For high-security environments, consider additional kernel integrity monitoring tools to detect exploitation attempts. 8. Coordinate with Apple support channels for any further guidance or advanced mitigations if patching is delayed or infeasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2026-03-03T16:36:03.968Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c333ddf4197a8e3baaeaee

Added to database: 3/25/2026, 1:01:17 AM

Last enriched: 4/3/2026, 3:08:25 AM

Last updated: 5/8/2026, 9:03:25 PM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses