CVE-2026-28894
Published: 25 March 2026
Summary
CVE-2026-28894 is a high-severity Improper Input Validation (CWE-20) vulnerability in Apple Macos. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 42.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the improper input validation (CWE-20) root cause by enforcing validation of information inputs to block malformed data causing DoS.
Specifically protects against denial-of-service events like this remote, unauthenticated attack via malformed inputs disrupting availability.
Ensures timely identification, reporting, and patching of flaws like this input validation vulnerability, matching Apple's fix in updated OS versions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated DoS via malformed input and improper validation (CWE-20) on Apple endpoints directly enables T1499.004 Application or System Exploitation to crash or disrupt the device/service.
NVD Description
A denial-of-service issue was addressed with improved input validation. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. A remote attacker may be able to cause a denial-of-service.
Deeper analysisAI
CVE-2026-28894 is a denial-of-service vulnerability stemming from improper input validation (CWE-20) in Apple operating systems. It affects versions of iOS and iPadOS prior to 26.4, as well as macOS Sequoia prior to 15.7.5, macOS Sonoma prior to 14.8.5, and macOS Tahoe prior to 26.4. The issue has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity due to its potential for significant availability disruption without requiring user interaction or privileges.
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity by sending malformed input, leading to a denial-of-service condition that crashes or otherwise disrupts the affected device or service.
Apple security advisories, available at support.apple.com/en-us/126792, 126794, 126795, and 126796, confirm the issue was addressed through improved input validation in the specified patched versions. Security practitioners should prioritize updating affected Apple devices to mitigate remote DoS risks.
Details
- CWE(s)