Data Redaction Vulnerability in Apple iOS and macOS Products
CVE-2026-28868

5.5MEDIUM

Key Information:

Vendor

Apple

Vendor
CVE Published:
25 March 2026

What is CVE-2026-28868?

CVE-2026-28868 is a vulnerability related to data redaction in various Apple products, including iOS, iPadOS, macOS, visionOS, and watchOS. This flaw arises from a logging issue that could potentially allow applications to disclose sensitive kernel memory information. The ability to access kernel memory can lead to serious security risks, including unauthorized data exposure and breaches of user privacy. The impact of this vulnerability is particularly concerning as it affects a wide range of widely-used devices and operating systems, which are integral to both personal and organizational operations. Apple has addressed this issue in recent updates, emphasizing the need for users to apply the latest software versions to mitigate any associated risks.

Potential impact of CVE-2026-28868

  1. Exposure of Sensitive Data: If exploited, this vulnerability can lead applications to improperly disclose sensitive data from kernel memory, risking the privacy of user information and organization-sensitive data.

  2. Increased Attack Surface: The nature of this vulnerability broadens the attack surface for malicious actors, allowing them potential avenues to weaponize the information leaked from kernel memory, which could lead to more complex attacks against the system.

  3. Trust Compromise: Organizations relying on Apple products may suffer a decline in trust from their customers or users if sensitive information is exposed due to this flaw, leading to reputational damage and potential loss of business.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

iOS and iPadOS 0 < 18.7.7

iOS and iPadOS 0 < 26.4

macOS 0 < 14.8.5

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.