CVE-2026-28835: Mounting a maliciously crafted SMB network share may lead to system termination in Apple macOS
A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. Mounting a maliciously crafted SMB network share may lead to system termination.
AI Analysis
Technical Summary
CVE-2026-28835 is a use-after-free vulnerability (CWE-416) discovered in the SMB client implementation of Apple macOS. This flaw arises from improper memory management when mounting SMB network shares, allowing an attacker to craft a malicious SMB share that triggers a use-after-free condition. When a user mounts this share, the system attempts to access freed memory, leading to a system crash or termination. The vulnerability affects multiple macOS versions prior to the patched releases: Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4. The issue does not allow for code execution or data leakage but results in a denial of service by forcing the system to terminate unexpectedly. Exploitation requires no privileges but does require user interaction to mount the malicious share. The CVSS v3.1 score of 6.5 reflects a network attack vector with low complexity and no privileges required, but user interaction is necessary. Apple addressed the vulnerability by improving memory management in the SMB client code. No public exploits have been reported, and no patch links were provided in the source, but users are advised to update to the fixed macOS versions.
Potential Impact
The primary impact of CVE-2026-28835 is denial of service through system termination on affected macOS devices. This can disrupt user productivity and potentially cause data loss if unsaved work is lost during the crash. Organizations relying on macOS endpoints that frequently connect to SMB network shares—common in enterprise file sharing environments—may experience operational interruptions. While the vulnerability does not compromise confidentiality or integrity, repeated exploitation could be used as a nuisance or to disrupt critical workflows. In environments where macOS devices are used for sensitive or critical operations, such as creative industries, software development, or enterprise IT, this vulnerability could degrade service availability. Since no authentication or elevated privileges are required, and the attack vector is network-based, the threat surface is broad for any macOS user who mounts SMB shares, especially in mixed OS environments where SMB is prevalent.
Mitigation Recommendations
To mitigate CVE-2026-28835, organizations should prioritize updating all macOS devices to the patched versions: Sequoia 15.7.5, Sonoma 14.8.5, or Tahoe 26.4 as applicable. Until patches are applied, users should avoid mounting SMB shares from untrusted or unknown sources. Network administrators can implement SMB traffic filtering or monitoring to detect and block suspicious SMB share mounts originating from untrusted hosts. Employing endpoint protection solutions that monitor abnormal SMB activity or system crashes may help detect exploitation attempts. Additionally, educating users about the risks of mounting unknown SMB shares can reduce the likelihood of exploitation. For environments where SMB is essential, consider alternative secure file sharing protocols or VPNs to reduce exposure. Regularly review and audit network share permissions and access controls to limit exposure to potentially malicious SMB servers.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India
CVE-2026-28835: Mounting a maliciously crafted SMB network share may lead to system termination in Apple macOS
Description
A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. Mounting a maliciously crafted SMB network share may lead to system termination.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-28835 is a use-after-free vulnerability (CWE-416) discovered in the SMB client implementation of Apple macOS. This flaw arises from improper memory management when mounting SMB network shares, allowing an attacker to craft a malicious SMB share that triggers a use-after-free condition. When a user mounts this share, the system attempts to access freed memory, leading to a system crash or termination. The vulnerability affects multiple macOS versions prior to the patched releases: Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4. The issue does not allow for code execution or data leakage but results in a denial of service by forcing the system to terminate unexpectedly. Exploitation requires no privileges but does require user interaction to mount the malicious share. The CVSS v3.1 score of 6.5 reflects a network attack vector with low complexity and no privileges required, but user interaction is necessary. Apple addressed the vulnerability by improving memory management in the SMB client code. No public exploits have been reported, and no patch links were provided in the source, but users are advised to update to the fixed macOS versions.
Potential Impact
The primary impact of CVE-2026-28835 is denial of service through system termination on affected macOS devices. This can disrupt user productivity and potentially cause data loss if unsaved work is lost during the crash. Organizations relying on macOS endpoints that frequently connect to SMB network shares—common in enterprise file sharing environments—may experience operational interruptions. While the vulnerability does not compromise confidentiality or integrity, repeated exploitation could be used as a nuisance or to disrupt critical workflows. In environments where macOS devices are used for sensitive or critical operations, such as creative industries, software development, or enterprise IT, this vulnerability could degrade service availability. Since no authentication or elevated privileges are required, and the attack vector is network-based, the threat surface is broad for any macOS user who mounts SMB shares, especially in mixed OS environments where SMB is prevalent.
Mitigation Recommendations
To mitigate CVE-2026-28835, organizations should prioritize updating all macOS devices to the patched versions: Sequoia 15.7.5, Sonoma 14.8.5, or Tahoe 26.4 as applicable. Until patches are applied, users should avoid mounting SMB shares from untrusted or unknown sources. Network administrators can implement SMB traffic filtering or monitoring to detect and block suspicious SMB share mounts originating from untrusted hosts. Employing endpoint protection solutions that monitor abnormal SMB activity or system crashes may help detect exploitation attempts. Additionally, educating users about the risks of mounting unknown SMB shares can reduce the likelihood of exploitation. For environments where SMB is essential, consider alternative secure file sharing protocols or VPNs to reduce exposure. Regularly review and audit network share permissions and access controls to limit exposure to potentially malicious SMB servers.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2026-03-03T16:36:03.969Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69c333ddf4197a8e3baaeafd
Added to database: 3/25/2026, 1:01:17 AM
Last enriched: 4/3/2026, 3:09:07 AM
Last updated: 5/9/2026, 1:33:13 PM
Views: 367
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.