Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28870: An app may be able to access sensitive user data in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2026-28870cvecve-2026-28870
Published: Wed Mar 25 2026 (03/25/2026, 00:31:50 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

CVE-2026-28870 is an information leakage vulnerability affecting Apple iOS and iPadOS, where a malicious app may access sensitive user data due to insufficient validation. The issue is resolved in iOS 26. 4 and iPadOS 26. 4, along with updates to macOS Tahoe, tvOS, visionOS, and watchOS. No known exploits are currently reported in the wild. The vulnerability could allow unauthorized access to confidential information, impacting user privacy and potentially enabling further attacks. Exploitation does not require user interaction or authentication, increasing risk. Organizations relying on Apple mobile devices should prioritize patching to prevent data leakage. Countries with high Apple device usage and strategic interest in mobile security are at greater risk. Mitigation involves updating affected devices promptly and auditing app permissions and behaviors.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:20:56 UTC

Technical Analysis

CVE-2026-28870 is a vulnerability identified in Apple’s iOS and iPadOS platforms, where an application may exploit insufficient validation mechanisms to access sensitive user data improperly. This issue represents an information leakage flaw, which Apple addressed by implementing additional validation checks in the operating system. The vulnerability affects multiple Apple platforms, including iOS, iPadOS, macOS Tahoe, tvOS, visionOS, and watchOS, all fixed in their respective 26.4 updates. The flaw allows a malicious or compromised app to bypass normal data access restrictions, potentially exposing confidential user information such as personal identifiers, credentials, or other private data stored or accessible on the device. Although no active exploitation has been reported, the vulnerability’s presence in widely used Apple operating systems poses a significant risk. The lack of a CVSS score suggests the vulnerability was recently published, and detailed exploitability metrics are not yet available. However, the nature of the flaw—information leakage without requiring user interaction or authentication—indicates a serious security concern. The vulnerability’s root cause lies in inadequate validation of access controls or data handling routines within the OS, which Apple has corrected through patches. Organizations and users running affected Apple OS versions should apply updates immediately to mitigate potential data breaches and privacy violations.

Potential Impact

The primary impact of CVE-2026-28870 is unauthorized disclosure of sensitive user data, which can compromise user privacy and confidentiality. For organizations, this could lead to leakage of corporate or personal information, potentially facilitating identity theft, corporate espionage, or targeted attacks. The vulnerability could undermine trust in Apple devices, especially in sectors requiring stringent data protection such as finance, healthcare, and government. Since exploitation does not require user interaction or authentication, attackers could silently extract data once an app is installed, increasing the risk of widespread compromise. The availability and integrity of systems are less directly affected, but the confidentiality breach alone can have severe regulatory and reputational consequences. Enterprises with BYOD policies or those deploying iOS/iPadOS devices for sensitive operations are particularly vulnerable. The lack of known exploits suggests a window of opportunity for defenders to patch before active attacks emerge, but also means attackers may be developing exploits. Overall, the threat could impact millions of users globally given Apple’s market share, with significant consequences for privacy and data security.

Mitigation Recommendations

1. Immediately update all affected Apple devices to iOS 26.4, iPadOS 26.4, and corresponding updates for macOS Tahoe, tvOS, visionOS, and watchOS to apply the security patches. 2. Audit installed applications for suspicious or untrusted apps that may exploit this vulnerability and remove any unnecessary or unverified apps. 3. Implement strict app vetting policies, especially in enterprise environments, to prevent installation of potentially malicious apps. 4. Employ Mobile Device Management (MDM) solutions to enforce update compliance and restrict app permissions to the minimum necessary. 5. Monitor device logs and network traffic for unusual data access patterns that could indicate exploitation attempts. 6. Educate users about the risks of installing apps from untrusted sources and encourage prompt installation of security updates. 7. For organizations, consider additional encryption of sensitive data at rest and in transit to reduce impact if leakage occurs. 8. Stay informed on any emerging exploit reports or additional patches from Apple to respond quickly to evolving threats.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2026-03-03T16:36:03.973Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c333e1f4197a8e3baaecb4

Added to database: 3/25/2026, 1:01:21 AM

Last enriched: 3/25/2026, 1:20:56 AM

Last updated: 3/25/2026, 2:09:45 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses