CVE-2026-28895: An attacker with physical access to an iOS device with Stolen Device Protection enabled may be able to access biometrics-gated Protected Apps with the passcode in Apple iOS and iPadOS
The issue was addressed with improved checks. This issue is fixed in iOS 26.4 and iPadOS 26.4. An attacker with physical access to an iOS device with Stolen Device Protection enabled may be able to access biometrics-gated Protected Apps with the passcode.
AI Analysis
Technical Summary
CVE-2026-28895 is a vulnerability in Apple iOS and iPadOS that affects devices with Stolen Device Protection enabled. This security feature is designed to protect sensitive applications by gating access behind biometric authentication, such as Face ID or Touch ID. However, the vulnerability allows an attacker who has physical possession of the device to bypass these biometric gates by using the device passcode instead. The flaw stems from insufficient verification checks in the authentication logic that governs access to biometrically protected apps. Specifically, the attacker can leverage the passcode authentication path to gain access to apps that should otherwise require biometric confirmation. This compromises the confidentiality of data within those protected apps without affecting data integrity or device availability. The vulnerability was addressed by Apple in iOS and iPadOS version 26.4, which introduced improved checks to ensure that biometric gating cannot be circumvented via passcode entry. The CVSS v3.1 base score is 4.6, reflecting a medium severity with an attack vector requiring physical access, low attack complexity, no privileges or user interaction needed, and a high impact on confidentiality. No known exploits have been reported in the wild, but the vulnerability poses a risk in scenarios where devices are lost, stolen, or otherwise physically compromised. The CWE-284 classification indicates an authorization bypass issue. This vulnerability highlights the importance of robust multi-factor authentication enforcement on mobile devices, especially for apps handling sensitive or protected data.
Potential Impact
The primary impact of CVE-2026-28895 is the unauthorized disclosure of sensitive information stored within biometrically protected applications on iOS and iPadOS devices. Attackers with physical access can bypass biometric authentication by using the device passcode, potentially exposing confidential data such as personal information, corporate secrets, or financial details. This undermines the confidentiality guarantees of the Stolen Device Protection feature. While the vulnerability does not affect data integrity or device availability, the breach of confidentiality can lead to privacy violations, identity theft, corporate espionage, or regulatory non-compliance for organizations. The risk is heightened in environments where devices are frequently lost, stolen, or accessible to untrusted individuals, such as in field operations, travel, or shared device scenarios. Organizations relying on Apple mobile devices for sensitive communications or data storage may face increased exposure to insider threats or opportunistic attackers. Although no exploits are currently known in the wild, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations. Prompt patching is essential to mitigate these risks and maintain trust in device security controls.
Mitigation Recommendations
To mitigate CVE-2026-28895, organizations and users should immediately update all affected iOS and iPadOS devices to version 26.4 or later, where the vulnerability has been fixed with improved authentication checks. Beyond patching, organizations should enforce strict device management policies including enabling full-disk encryption and strong passcodes to reduce the risk of passcode compromise. Deploy Mobile Device Management (MDM) solutions to enforce security configurations and remotely wipe lost or stolen devices promptly. Limit physical access to devices, especially in high-risk environments, and educate users on the importance of reporting lost or stolen devices immediately. For highly sensitive applications, consider implementing additional application-level encryption or multi-factor authentication mechanisms that do not rely solely on device biometrics or passcodes. Regularly audit device security settings and access logs to detect suspicious activity. Finally, maintain an incident response plan that includes procedures for handling potential data exposure resulting from physical device compromise.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Japan, Australia, South Korea, China, India, Brazil
CVE-2026-28895: An attacker with physical access to an iOS device with Stolen Device Protection enabled may be able to access biometrics-gated Protected Apps with the passcode in Apple iOS and iPadOS
Description
The issue was addressed with improved checks. This issue is fixed in iOS 26.4 and iPadOS 26.4. An attacker with physical access to an iOS device with Stolen Device Protection enabled may be able to access biometrics-gated Protected Apps with the passcode.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-28895 is a vulnerability in Apple iOS and iPadOS that affects devices with Stolen Device Protection enabled. This security feature is designed to protect sensitive applications by gating access behind biometric authentication, such as Face ID or Touch ID. However, the vulnerability allows an attacker who has physical possession of the device to bypass these biometric gates by using the device passcode instead. The flaw stems from insufficient verification checks in the authentication logic that governs access to biometrically protected apps. Specifically, the attacker can leverage the passcode authentication path to gain access to apps that should otherwise require biometric confirmation. This compromises the confidentiality of data within those protected apps without affecting data integrity or device availability. The vulnerability was addressed by Apple in iOS and iPadOS version 26.4, which introduced improved checks to ensure that biometric gating cannot be circumvented via passcode entry. The CVSS v3.1 base score is 4.6, reflecting a medium severity with an attack vector requiring physical access, low attack complexity, no privileges or user interaction needed, and a high impact on confidentiality. No known exploits have been reported in the wild, but the vulnerability poses a risk in scenarios where devices are lost, stolen, or otherwise physically compromised. The CWE-284 classification indicates an authorization bypass issue. This vulnerability highlights the importance of robust multi-factor authentication enforcement on mobile devices, especially for apps handling sensitive or protected data.
Potential Impact
The primary impact of CVE-2026-28895 is the unauthorized disclosure of sensitive information stored within biometrically protected applications on iOS and iPadOS devices. Attackers with physical access can bypass biometric authentication by using the device passcode, potentially exposing confidential data such as personal information, corporate secrets, or financial details. This undermines the confidentiality guarantees of the Stolen Device Protection feature. While the vulnerability does not affect data integrity or device availability, the breach of confidentiality can lead to privacy violations, identity theft, corporate espionage, or regulatory non-compliance for organizations. The risk is heightened in environments where devices are frequently lost, stolen, or accessible to untrusted individuals, such as in field operations, travel, or shared device scenarios. Organizations relying on Apple mobile devices for sensitive communications or data storage may face increased exposure to insider threats or opportunistic attackers. Although no exploits are currently known in the wild, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations. Prompt patching is essential to mitigate these risks and maintain trust in device security controls.
Mitigation Recommendations
To mitigate CVE-2026-28895, organizations and users should immediately update all affected iOS and iPadOS devices to version 26.4 or later, where the vulnerability has been fixed with improved authentication checks. Beyond patching, organizations should enforce strict device management policies including enabling full-disk encryption and strong passcodes to reduce the risk of passcode compromise. Deploy Mobile Device Management (MDM) solutions to enforce security configurations and remotely wipe lost or stolen devices promptly. Limit physical access to devices, especially in high-risk environments, and educate users on the importance of reporting lost or stolen devices immediately. For highly sensitive applications, consider implementing additional application-level encryption or multi-factor authentication mechanisms that do not rely solely on device biometrics or passcodes. Regularly audit device security settings and access logs to detect suspicious activity. Finally, maintain an incident response plan that includes procedures for handling potential data exposure resulting from physical device compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2026-03-03T16:36:03.981Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69c333e4f4197a8e3baaedb9
Added to database: 3/25/2026, 1:01:24 AM
Last enriched: 4/3/2026, 3:17:38 AM
Last updated: 5/8/2026, 7:24:32 PM
Views: 186
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.