Description
A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. Mounting a maliciously crafted SMB network share may lead to system termination.
Published: 2026-03-25
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a use‑after‑free flaw classified as CWE‑416. A maliciously crafted SMB network share can trigger the flaw in macOS’s memory management, resulting in an unexpected system crash. The primary impact is a denial of service: the operating system terminates, causing loss of availability for all running applications and potentially disrupting critical services.

Affected Systems

Apple’s macOS operating system is affected. The flaw is present in all releases prior to the security updates listed in Apple’s documentation: macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4. Users running any earlier version of these macOS releases are susceptible.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity. Exploit probability is low, with an EPSS score of less than 1%, and the vulnerability is not catalogued in the CISA KEV list. Attackers would need to gain network access to deliver a malicious SMB share. Although the CVE does not explicitly state an attack vector, the description suggests a remote exploitation path via the SMB protocol.

Generated by OpenCVE AI on March 25, 2026 at 22:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest macOS updates, specifically macOS Sequoia 15.7.5 or newer, macOS Sonoma 14.8.5 or newer, or macOS Tahoe 26.4 or newer.
  • Avoid mounting SMB shares from untrusted or unknown servers.
  • Monitor system logs for unexpected crashes or SMB connection attempts.
  • Ensure that automatic mounting of SMB shares is disabled or strictly filtered if updates cannot be applied immediately.

Generated by OpenCVE AI on March 25, 2026 at 22:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Title Use-After-Free Causing System Termination via Malicious SMB Share Use‑After‑Free Leading to System Termination via Malicious SMB Share

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Use-After-Free Causing System Termination via Malicious SMB Share

Wed, 25 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 25 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. Mounting a maliciously crafted SMB network share may lead to system termination.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:20:57.216Z

Reserved: 2026-03-03T16:36:03.969Z

Link: CVE-2026-28835

cve-icon Vulnrichment

Updated: 2026-03-25T19:03:36.827Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T01:17:08.587

Modified: 2026-03-25T21:30:50.887

Link: CVE-2026-28835

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:17:55Z

Weaknesses