Description
A stack overflow was addressed with improved input validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to cause a denial-of-service.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

A stack overflow condition in several Apple operating systems originates from insufficient input validation, allowing applications to trigger a crash that ends processing of legitimate operations. The flaw results in a denial‑of‑service that affects the target device's stability but does not grant code execution or data exfiltration. This weakness is identified as a buffer overflow (CWE‑20).

Affected Systems

Affected platforms include iOS and iPadOS on versions 18.7.7 and 26.4, macOS in the Sequoia 15.7.5 and Tahoe 26.4 releases, as well as tvOS, visionOS, and watchOS all on the 26.4 update. Devices running these builds are vulnerable until an update that implements the tightened input validation is installed.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score of under 1% shows a very low probability that the flaw will be actively exploited. The flaw is not listed in the CISA KEV catalog, suggesting no confirmed exploits in the wild. Attackers would need to supply crafted data to a vulnerable application or run a malicious app on the device; as such, the primary vector is application-level input, and no elevation of privilege is required. Once triggered, the device becomes unresponsive until reboot, impairing availability.

Generated by OpenCVE AI on March 25, 2026 at 21:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade affected devices to the latest available operating system releases that contain the stack‑overflow fix.
  • Verify that all connected applications have been updated to compatible versions.
  • If an update is temporarily unavailable, avoid installing or using applications known to trigger the vulnerability.

Generated by OpenCVE AI on March 25, 2026 at 21:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Stack Overflow Exploitable for Denial of Service Across Apple Operating Systems

Wed, 25 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os

Wed, 25 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description A stack overflow was addressed with improved input validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to cause a denial-of-service.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:25:25.723Z

Reserved: 2026-03-03T16:36:03.971Z

Link: CVE-2026-28852

cve-icon Vulnrichment

Updated: 2026-03-25T16:14:31.402Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T01:17:09.410

Modified: 2026-03-25T20:06:40.263

Link: CVE-2026-28852

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:48:11Z

Weaknesses