Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28895: An attacker with physical access to an iOS device with Stolen Device Protection enabled may be able to access biometrics-gated Protected Apps with the passcode in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2026-28895cvecve-2026-28895
Published: Wed Mar 25 2026 (03/25/2026, 00:32:11 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with improved checks. This issue is fixed in iOS 26.4 and iPadOS 26.4. An attacker with physical access to an iOS device with Stolen Device Protection enabled may be able to access biometrics-gated Protected Apps with the passcode.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:17:38 UTC

Technical Analysis

CVE-2026-28895 is a vulnerability in Apple iOS and iPadOS that affects devices with Stolen Device Protection enabled. This security feature is designed to protect sensitive applications by gating access behind biometric authentication, such as Face ID or Touch ID. However, the vulnerability allows an attacker who has physical possession of the device to bypass these biometric gates by using the device passcode instead. The flaw stems from insufficient verification checks in the authentication logic that governs access to biometrically protected apps. Specifically, the attacker can leverage the passcode authentication path to gain access to apps that should otherwise require biometric confirmation. This compromises the confidentiality of data within those protected apps without affecting data integrity or device availability. The vulnerability was addressed by Apple in iOS and iPadOS version 26.4, which introduced improved checks to ensure that biometric gating cannot be circumvented via passcode entry. The CVSS v3.1 base score is 4.6, reflecting a medium severity with an attack vector requiring physical access, low attack complexity, no privileges or user interaction needed, and a high impact on confidentiality. No known exploits have been reported in the wild, but the vulnerability poses a risk in scenarios where devices are lost, stolen, or otherwise physically compromised. The CWE-284 classification indicates an authorization bypass issue. This vulnerability highlights the importance of robust multi-factor authentication enforcement on mobile devices, especially for apps handling sensitive or protected data.

Potential Impact

The primary impact of CVE-2026-28895 is the unauthorized disclosure of sensitive information stored within biometrically protected applications on iOS and iPadOS devices. Attackers with physical access can bypass biometric authentication by using the device passcode, potentially exposing confidential data such as personal information, corporate secrets, or financial details. This undermines the confidentiality guarantees of the Stolen Device Protection feature. While the vulnerability does not affect data integrity or device availability, the breach of confidentiality can lead to privacy violations, identity theft, corporate espionage, or regulatory non-compliance for organizations. The risk is heightened in environments where devices are frequently lost, stolen, or accessible to untrusted individuals, such as in field operations, travel, or shared device scenarios. Organizations relying on Apple mobile devices for sensitive communications or data storage may face increased exposure to insider threats or opportunistic attackers. Although no exploits are currently known in the wild, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations. Prompt patching is essential to mitigate these risks and maintain trust in device security controls.

Mitigation Recommendations

To mitigate CVE-2026-28895, organizations and users should immediately update all affected iOS and iPadOS devices to version 26.4 or later, where the vulnerability has been fixed with improved authentication checks. Beyond patching, organizations should enforce strict device management policies including enabling full-disk encryption and strong passcodes to reduce the risk of passcode compromise. Deploy Mobile Device Management (MDM) solutions to enforce security configurations and remotely wipe lost or stolen devices promptly. Limit physical access to devices, especially in high-risk environments, and educate users on the importance of reporting lost or stolen devices immediately. For highly sensitive applications, consider implementing additional application-level encryption or multi-factor authentication mechanisms that do not rely solely on device biometrics or passcodes. Regularly audit device security settings and access logs to detect suspicious activity. Finally, maintain an incident response plan that includes procedures for handling potential data exposure resulting from physical device compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2026-03-03T16:36:03.981Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c333e4f4197a8e3baaedb9

Added to database: 3/25/2026, 1:01:24 AM

Last enriched: 4/3/2026, 3:17:38 AM

Last updated: 5/8/2026, 7:24:32 PM

Views: 186

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses