Cyber Posture

CVE-2026-28876

High

Published: 25 March 2026

Published
25 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0006 17.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28876 is a high-severity Improper Access Control (CWE-284) vulnerability in Apple Macos. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 17.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of directory path inputs to prevent parsing flaws that enable unauthorized app access to sensitive user data.

prevent

Enforces approved access authorizations to block apps from bypassing controls via malformed directory paths.

prevent

Implements a reference monitor to mediate and enforce access control policies against path-based access violations.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path validation flaw (CWE-284) in directory handling allows a malicious app to bypass access controls and read arbitrary sensitive files on the local device, directly enabling data collection from the local system.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS…

more

26.4. An app may be able to access sensitive user data.

Deeper analysisAI

CVE-2026-28876 is a parsing issue in the handling of directory paths, addressed with improved path validation across multiple Apple operating systems. The affected components include iOS prior to versions 18.7.7 and 26.4, iPadOS prior to 18.7.7 and 26.4, macOS Sequoia prior to 15.7.5, macOS Sonoma prior to 14.8.5, macOS Tahoe prior to 26.4, and visionOS prior to 26.4. Classified under CWE-284 (Improper Access Control), it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high-impact confidentiality risks.

An attacker can exploit this vulnerability through a malicious app installed on the device, enabling access to sensitive user data. The attack vector is network-based with low complexity, requiring no user privileges or interaction, and maintains unchanged scope while solely impacting confidentiality.

Apple's advisories detail the fixes in the listed versions, recommending immediate updates to iOS 18.7.7 or 26.4, iPadOS 18.7.7 or 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4. Additional mitigation guidance is available in support documents at https://support.apple.com/en-us/126792, https://support.apple.com/en-us/126793, https://support.apple.com/en-us/126794, https://support.apple.com/en-us/126795, and https://support.apple.com/en-us/126796.

Details

CWE(s)

Affected Products

apple
ipados
≤ 18.7.7 · 26.0 — 26.4
apple
iphone os
≤ 18.7.7 · 26.0 — 26.4
apple
macos
14.0 — 14.8.5 · 15.0 — 15.7.5 · 26.0 — 26.4
apple
visionos
≤ 26.4

CVEs Like This One

CVE-2026-28855Same product: Apple Ipados
CVE-2025-30433Same product: Apple Ipados
CVE-2025-24173Same product: Apple Ipados
CVE-2025-24229Same product: Apple Macos
CVE-2026-28837Same product: Apple Macos
CVE-2025-43428Same product: Apple Ipados
CVE-2026-20628Same product: Apple Ipados
CVE-2025-31183Same product: Apple Ipados
CVE-2026-20616Same product: Apple Ipados
CVE-2026-20688Same product: Apple Ipados

References