Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28858: A remote user may be able to cause unexpected system termination or corrupt kernel memory in Apple iOS and iPadOS

0
Critical
VulnerabilityCVE-2026-28858cvecve-2026-28858
Published: Wed Mar 25 2026 (03/25/2026, 00:32:28 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 26.4 and iPadOS 26.4. A remote user may be able to cause unexpected system termination or corrupt kernel memory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:11:48 UTC

Technical Analysis

CVE-2026-28858 is a critical security vulnerability identified in Apple’s iOS and iPadOS operating systems, specifically related to a buffer overflow condition categorized under CWE-120. This vulnerability stems from improper bounds checking in kernel-level code, which can be triggered remotely without any authentication or user interaction. Exploiting this flaw allows an attacker to cause unexpected system termination (crashes) or corrupt kernel memory, potentially leading to arbitrary code execution with kernel privileges. Such a compromise can result in full device takeover, exposing sensitive data and disrupting device availability. The vulnerability affects all versions prior to iOS and iPadOS 26.4, where Apple has implemented improved bounds checking to remediate the issue. The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical impact, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the severity and ease of exploitation make this a significant threat. The kernel memory corruption aspect means that attackers could bypass many security controls, escalate privileges, and maintain persistent control over affected devices. This vulnerability is particularly concerning given the widespread use of iOS and iPadOS devices in both consumer and enterprise environments.

Potential Impact

The impact of CVE-2026-28858 is severe for organizations and individuals relying on Apple iOS and iPadOS devices. Successful exploitation can lead to complete compromise of the device’s kernel, allowing attackers to execute arbitrary code with the highest privileges. This can result in unauthorized access to sensitive information, installation of persistent malware, disruption of device availability through crashes or reboots, and potential lateral movement within enterprise networks. For organizations, this could mean data breaches, loss of intellectual property, and operational downtime. The vulnerability’s remote exploitability without authentication or user interaction significantly increases the attack surface, making it easier for threat actors to target large numbers of devices en masse. Given the critical role of iOS/iPadOS devices in mobile communications, business operations, and secure environments, the threat extends to sectors such as government, finance, healthcare, and critical infrastructure. The absence of known exploits in the wild currently provides a window for proactive patching and mitigation before widespread attacks emerge.

Mitigation Recommendations

To mitigate CVE-2026-28858, organizations and users should prioritize immediate deployment of the security updates provided in iOS and iPadOS 26.4, which contain the necessary bounds checking fixes. Beyond patching, network-level defenses should be enhanced by implementing strict firewall rules and intrusion detection/prevention systems to monitor and block suspicious traffic targeting Apple devices. Employing mobile device management (MDM) solutions can enforce timely updates and restrict installation of untrusted applications. Network segmentation can limit the exposure of vulnerable devices to untrusted networks. Additionally, organizations should conduct regular security audits and vulnerability assessments on their mobile device fleets. Monitoring for unusual device behavior or crashes can help detect exploitation attempts early. Educating users about the importance of updates and safe network practices further reduces risk. Since no exploits are currently known, rapid patching combined with layered defenses will be the most effective strategy to prevent exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2026-03-03T16:36:03.972Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c333dff4197a8e3baaeb44

Added to database: 3/25/2026, 1:01:19 AM

Last enriched: 4/3/2026, 3:11:48 AM

Last updated: 5/8/2026, 4:27:19 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses