Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28856: An attacker with physical access to a locked device may be able to view sensitive user information in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2026-28856cvecve-2026-28856
Published: Wed Mar 25 2026 (03/25/2026, 00:32:12 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

CVE-2026-28856 is a vulnerability in Apple iOS and iPadOS that allows an attacker with physical access to a locked device to view sensitive user information. The flaw stems from insufficient authentication mechanisms prior to iOS/iPadOS 26. 4, watchOS 26. 4, and visionOS 26. 4, which have addressed the issue with improved authentication controls. Exploitation does not require the device to be unlocked, increasing risk if the device is lost or stolen. No known exploits are currently in the wild. This vulnerability impacts confidentiality by exposing private data without user consent. Mitigation requires updating to the fixed OS versions. Countries with high Apple device usage and strategic interest in mobile device security are most at risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:33:06 UTC

Technical Analysis

CVE-2026-28856 is a security vulnerability affecting Apple’s iOS, iPadOS, watchOS, and visionOS platforms prior to version 26.4. The vulnerability allows an attacker who gains physical access to a locked device to bypass authentication controls and view sensitive user information stored on the device. This issue arises from inadequate enforcement of authentication mechanisms on locked devices, potentially exposing personal data such as contacts, messages, emails, or other private content. Apple addressed the vulnerability by enhancing authentication requirements in the 26.4 updates across affected platforms. The vulnerability does not require the device to be unlocked or any user interaction, making it particularly dangerous if a device is lost or stolen. Although no exploits have been reported in the wild, the risk remains significant due to the nature of physical access attacks. The vulnerability impacts the confidentiality of user data, as unauthorized viewing of sensitive information is possible. The affected versions include all iOS and iPadOS versions prior to 26.4, as well as corresponding versions of watchOS and visionOS. The vulnerability was publicly disclosed on March 25, 2026, with no CVSS score assigned. The fix is available via OS updates from Apple, emphasizing the importance of timely patching.

Potential Impact

The primary impact of CVE-2026-28856 is the compromise of confidentiality on Apple mobile devices. An attacker with physical access can bypass lock screen protections to view sensitive user information without authentication. This could lead to exposure of personal communications, credentials, financial data, or other private content stored on the device. Organizations relying on Apple devices for secure communications or data storage face risks of data leakage, potentially affecting employee privacy and corporate security. The vulnerability does not directly affect device integrity or availability but can facilitate further attacks if sensitive information is harvested. The ease of exploitation—requiring only physical access and no user interaction—makes this vulnerability particularly concerning in environments where devices may be lost, stolen, or temporarily unattended. While no active exploits are known, the potential for misuse in espionage, corporate espionage, or targeted attacks is significant. The impact is amplified in sectors handling sensitive or regulated data, such as government, finance, healthcare, and critical infrastructure.

Mitigation Recommendations

To mitigate CVE-2026-28856, organizations and users must promptly update all affected Apple devices to iOS, iPadOS, watchOS, and visionOS version 26.4 or later. This update includes improved authentication mechanisms that prevent unauthorized access to sensitive information on locked devices. Beyond patching, organizations should enforce strict physical security controls to limit unauthorized access to devices, including secure storage, device tracking, and policies for lost or stolen devices. Enabling full-disk encryption and strong passcodes can further reduce risk. Additionally, deploying mobile device management (MDM) solutions can enforce compliance with update policies and remotely wipe devices if compromised. User training on the risks of physical device loss and the importance of timely updates is critical. Regular audits of device security posture and incident response plans for lost or stolen devices will enhance resilience against exploitation of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2026-03-03T16:36:03.972Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c333dff4197a8e3baaeb39

Added to database: 3/25/2026, 1:01:19 AM

Last enriched: 3/25/2026, 1:33:06 AM

Last updated: 3/25/2026, 5:52:32 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses