Description
A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An attacker may be able to cause unexpected app termination.
Published: 2026-03-25
Score: 6.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Application Crash
Action: Immediate Patch
AI Analysis

Impact

A flaw that allows type confusion between different memory object types was addressed by improved memory handling in Apple operating systems. The vulnerability can lead to an unexpected application termination when certain memory operations misinterpret the type of data being processed. The primary impact is a denial of service for the affected application, limiting functionality but not directly exposing sensitive data or system privileges.

Affected Systems

Apple’s iOS and iPadOS, macOS, tvOS, visionOS, and watchOS are affected. The bug has been patched in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.

Risk and Exploitability

The CVSS base score of 6.2 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation. The flaw is not listed in the CISA KEV catalog. Exploitation would require an attacker to deliver input that triggers the type confusion, potentially through user‑initiated actions or malicious content processed by vulnerable applications. As it only causes a crash, the risk is limited to service disruption rather than data compromise.

Generated by OpenCVE AI on March 25, 2026 at 20:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the most recent Apple OS updates that include the fix for the respective platform (iOS 26.4, iPadOS 26.4, macOS 15.7.5, macOS 14.8.5, macOS 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4).
  • Verify that your device is running a patched version by checking the OS version in Settings (iOS/iPadOS), System Settings (macOS), or About menus (tvOS, visionOS, watchOS).
  • If an update is not yet available, restrict installation of untrusted third‑party applications and monitor Apple’s support site for further updates.

Generated by OpenCVE AI on March 25, 2026 at 20:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Type confusion causes application crashes

Wed, 25 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os

Wed, 25 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-843
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An attacker may be able to cause unexpected app termination.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:19:17.561Z

Reserved: 2026-03-03T16:36:03.967Z

Link: CVE-2026-28822

cve-icon Vulnrichment

Updated: 2026-03-25T14:38:51.068Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T01:17:07.383

Modified: 2026-03-25T20:52:42.953

Link: CVE-2026-28822

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:16:42Z

Weaknesses