CVE-2026-28856: An attacker with physical access to a locked device may be able to view sensitive user information in Apple iOS and iPadOS
CVE-2026-28856 is a vulnerability in Apple iOS and iPadOS that allows an attacker with physical access to a locked device to view sensitive user information. The flaw stems from insufficient authentication mechanisms prior to iOS/iPadOS 26. 4, watchOS 26. 4, and visionOS 26. 4, which have addressed the issue with improved authentication controls. Exploitation does not require the device to be unlocked, increasing risk if the device is lost or stolen. No known exploits are currently in the wild. This vulnerability impacts confidentiality by exposing private data without user consent. Mitigation requires updating to the fixed OS versions. Countries with high Apple device usage and strategic interest in mobile device security are most at risk.
AI Analysis
Technical Summary
CVE-2026-28856 is a security vulnerability affecting Apple’s iOS, iPadOS, watchOS, and visionOS platforms prior to version 26.4. The vulnerability allows an attacker who gains physical access to a locked device to bypass authentication controls and view sensitive user information stored on the device. This issue arises from inadequate enforcement of authentication mechanisms on locked devices, potentially exposing personal data such as contacts, messages, emails, or other private content. Apple addressed the vulnerability by enhancing authentication requirements in the 26.4 updates across affected platforms. The vulnerability does not require the device to be unlocked or any user interaction, making it particularly dangerous if a device is lost or stolen. Although no exploits have been reported in the wild, the risk remains significant due to the nature of physical access attacks. The vulnerability impacts the confidentiality of user data, as unauthorized viewing of sensitive information is possible. The affected versions include all iOS and iPadOS versions prior to 26.4, as well as corresponding versions of watchOS and visionOS. The vulnerability was publicly disclosed on March 25, 2026, with no CVSS score assigned. The fix is available via OS updates from Apple, emphasizing the importance of timely patching.
Potential Impact
The primary impact of CVE-2026-28856 is the compromise of confidentiality on Apple mobile devices. An attacker with physical access can bypass lock screen protections to view sensitive user information without authentication. This could lead to exposure of personal communications, credentials, financial data, or other private content stored on the device. Organizations relying on Apple devices for secure communications or data storage face risks of data leakage, potentially affecting employee privacy and corporate security. The vulnerability does not directly affect device integrity or availability but can facilitate further attacks if sensitive information is harvested. The ease of exploitation—requiring only physical access and no user interaction—makes this vulnerability particularly concerning in environments where devices may be lost, stolen, or temporarily unattended. While no active exploits are known, the potential for misuse in espionage, corporate espionage, or targeted attacks is significant. The impact is amplified in sectors handling sensitive or regulated data, such as government, finance, healthcare, and critical infrastructure.
Mitigation Recommendations
To mitigate CVE-2026-28856, organizations and users must promptly update all affected Apple devices to iOS, iPadOS, watchOS, and visionOS version 26.4 or later. This update includes improved authentication mechanisms that prevent unauthorized access to sensitive information on locked devices. Beyond patching, organizations should enforce strict physical security controls to limit unauthorized access to devices, including secure storage, device tracking, and policies for lost or stolen devices. Enabling full-disk encryption and strong passcodes can further reduce risk. Additionally, deploying mobile device management (MDM) solutions can enforce compliance with update policies and remotely wipe devices if compromised. User training on the risks of physical device loss and the importance of timely updates is critical. Regular audits of device security posture and incident response plans for lost or stolen devices will enhance resilience against exploitation of this vulnerability.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil, Italy, Spain, Netherlands, Sweden
CVE-2026-28856: An attacker with physical access to a locked device may be able to view sensitive user information in Apple iOS and iPadOS
Description
CVE-2026-28856 is a vulnerability in Apple iOS and iPadOS that allows an attacker with physical access to a locked device to view sensitive user information. The flaw stems from insufficient authentication mechanisms prior to iOS/iPadOS 26. 4, watchOS 26. 4, and visionOS 26. 4, which have addressed the issue with improved authentication controls. Exploitation does not require the device to be unlocked, increasing risk if the device is lost or stolen. No known exploits are currently in the wild. This vulnerability impacts confidentiality by exposing private data without user consent. Mitigation requires updating to the fixed OS versions. Countries with high Apple device usage and strategic interest in mobile device security are most at risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-28856 is a security vulnerability affecting Apple’s iOS, iPadOS, watchOS, and visionOS platforms prior to version 26.4. The vulnerability allows an attacker who gains physical access to a locked device to bypass authentication controls and view sensitive user information stored on the device. This issue arises from inadequate enforcement of authentication mechanisms on locked devices, potentially exposing personal data such as contacts, messages, emails, or other private content. Apple addressed the vulnerability by enhancing authentication requirements in the 26.4 updates across affected platforms. The vulnerability does not require the device to be unlocked or any user interaction, making it particularly dangerous if a device is lost or stolen. Although no exploits have been reported in the wild, the risk remains significant due to the nature of physical access attacks. The vulnerability impacts the confidentiality of user data, as unauthorized viewing of sensitive information is possible. The affected versions include all iOS and iPadOS versions prior to 26.4, as well as corresponding versions of watchOS and visionOS. The vulnerability was publicly disclosed on March 25, 2026, with no CVSS score assigned. The fix is available via OS updates from Apple, emphasizing the importance of timely patching.
Potential Impact
The primary impact of CVE-2026-28856 is the compromise of confidentiality on Apple mobile devices. An attacker with physical access can bypass lock screen protections to view sensitive user information without authentication. This could lead to exposure of personal communications, credentials, financial data, or other private content stored on the device. Organizations relying on Apple devices for secure communications or data storage face risks of data leakage, potentially affecting employee privacy and corporate security. The vulnerability does not directly affect device integrity or availability but can facilitate further attacks if sensitive information is harvested. The ease of exploitation—requiring only physical access and no user interaction—makes this vulnerability particularly concerning in environments where devices may be lost, stolen, or temporarily unattended. While no active exploits are known, the potential for misuse in espionage, corporate espionage, or targeted attacks is significant. The impact is amplified in sectors handling sensitive or regulated data, such as government, finance, healthcare, and critical infrastructure.
Mitigation Recommendations
To mitigate CVE-2026-28856, organizations and users must promptly update all affected Apple devices to iOS, iPadOS, watchOS, and visionOS version 26.4 or later. This update includes improved authentication mechanisms that prevent unauthorized access to sensitive information on locked devices. Beyond patching, organizations should enforce strict physical security controls to limit unauthorized access to devices, including secure storage, device tracking, and policies for lost or stolen devices. Enabling full-disk encryption and strong passcodes can further reduce risk. Additionally, deploying mobile device management (MDM) solutions can enforce compliance with update policies and remotely wipe devices if compromised. User training on the risks of physical device loss and the importance of timely updates is critical. Regular audits of device security posture and incident response plans for lost or stolen devices will enhance resilience against exploitation of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2026-03-03T16:36:03.972Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69c333dff4197a8e3baaeb39
Added to database: 3/25/2026, 1:01:19 AM
Last enriched: 3/25/2026, 1:33:06 AM
Last updated: 3/25/2026, 5:52:32 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.