Cyber Posture

CVE-2026-28842

High

Published: 25 March 2026

Published
25 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0006 19.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28842 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Apple Macos. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 19.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces bounds checks on information inputs to prevent buffer overflows like the insufficient bounds checking in CVE-2026-28842.

prevent

Implements memory protection mechanisms to safeguard against memory corruption resulting from buffer overflow exploitation.

prevent

Mandates timely flaw remediation, such as applying the macOS Tahoe 26.4 patch that fixed the buffer overflow via improved bounds checks.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Remote buffer overflow enables direct application crashes via memory corruption, mapping to T1499.004 (Application or System Exploitation) for Endpoint Denial of Service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The issue was addressed with improved bounds checks. This issue is fixed in macOS Tahoe 26.4. A buffer overflow may result in memory corruption and unexpected app termination.

Deeper analysisAI

CVE-2026-28842 is a buffer overflow vulnerability (CWE-122) stemming from insufficient bounds checks in macOS Tahoe versions prior to 26.4. The flaw can lead to memory corruption and unexpected application termination, earning a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

An attacker can exploit this vulnerability remotely over the network with low complexity and no required privileges or user interaction. Successful exploitation results in high-impact availability disruption through memory corruption, potentially causing affected applications to crash and deny service to legitimate users.

Apple's security advisory at https://support.apple.com/en-us/126794 states that the issue was addressed in macOS Tahoe 26.4 through improved bounds checks, recommending users update to the patched version for mitigation.

Details

CWE(s)

Affected Products

apple
macos
26.0 — 26.4

CVEs Like This One

CVE-2025-24139Same product: Apple Macos
CVE-2025-43244Same product: Apple Macos
CVE-2026-20639Same product: Apple Macos
CVE-2025-46290Same product: Apple Macos
CVE-2025-24120Same product: Apple Macos
CVE-2025-30444Same product: Apple Macos
CVE-2025-24265Same product: Apple Macos
CVE-2025-24273Same product: Apple Macos
CVE-2024-44199Same product: Apple Macos
CVE-2025-24269Same product: Apple Macos

References