Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28858: A remote user may be able to cause unexpected system termination or corrupt kernel memory in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2026-28858cvecve-2026-28858
Published: Wed Mar 25 2026 (03/25/2026, 00:32:28 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

CVE-2026-28858 is a buffer overflow vulnerability in Apple iOS and iPadOS that allows a remote attacker to cause unexpected system termination or corrupt kernel memory. The flaw is due to insufficient bounds checking and affects versions prior to iOS and iPadOS 26. 4, where it has been fixed. Exploitation does not require user interaction but may allow remote code execution or denial of service by destabilizing the kernel. No known exploits are currently reported in the wild. Organizations using Apple mobile devices are at risk, especially those relying on iOS and iPadOS in critical environments. Mitigation involves promptly updating to iOS/iPadOS 26. 4 or later. Countries with high Apple device usage and strategic interest in mobile security are most likely affected. The severity is assessed as high due to the potential for kernel memory corruption and system crashes without authentication or user interaction.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:32:30 UTC

Technical Analysis

CVE-2026-28858 is a critical buffer overflow vulnerability discovered in Apple’s iOS and iPadOS operating systems. The vulnerability arises from improper bounds checking in kernel-level code, which can be triggered remotely by an attacker. This flaw allows a remote user to cause unexpected system termination (crashes) or corrupt kernel memory, potentially leading to privilege escalation or arbitrary code execution at the kernel level. The vulnerability affects all versions prior to iOS and iPadOS 26.4, where Apple has implemented improved bounds checking to address the issue. Because the kernel manages core system functions, corruption here can compromise device integrity, confidentiality, and availability. The vulnerability does not require user interaction or authentication, increasing its risk profile. Although no known exploits are currently reported in the wild, the potential impact is significant given the widespread use of Apple mobile devices globally. The absence of a CVSS score necessitates an expert severity assessment based on the technical details and potential impact.

Potential Impact

The impact of CVE-2026-28858 is substantial for organizations and individuals relying on Apple iOS and iPadOS devices. Successful exploitation can lead to system crashes, causing denial of service and potential data loss. More critically, kernel memory corruption could allow attackers to execute arbitrary code with kernel privileges, bypassing security controls and gaining full control over the device. This could lead to unauthorized access to sensitive data, persistent malware installation, and compromise of device integrity. Enterprises using iPhones and iPads for sensitive communications, mobile workforce operations, or as part of critical infrastructure are at heightened risk. The vulnerability’s remote exploitability without user interaction makes it a severe threat vector for targeted attacks and widespread exploitation once weaponized. The lack of known exploits currently provides a window for patch deployment but also underscores the urgency of timely updates.

Mitigation Recommendations

To mitigate CVE-2026-28858, organizations and users should immediately update all affected Apple devices to iOS and iPadOS version 26.4 or later, where the vulnerability has been patched with improved bounds checking. Network-level protections such as firewall rules and intrusion detection systems should be tuned to monitor and block suspicious traffic targeting Apple devices, especially from untrusted sources. Employing mobile device management (MDM) solutions can enforce timely patch deployment and compliance across enterprise fleets. Additionally, restricting unnecessary network exposure of iOS/iPadOS devices and disabling unused services can reduce attack surface. Security teams should monitor threat intelligence feeds for any emerging exploit activity related to this CVE. Regular backups and incident response plans should be updated to handle potential device compromises. Finally, educating users about the importance of updates and safe network practices will help reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2026-03-03T16:36:03.972Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c333dff4197a8e3baaeb44

Added to database: 3/25/2026, 1:01:19 AM

Last enriched: 3/25/2026, 1:32:30 AM

Last updated: 3/25/2026, 5:20:25 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses