Description
The issue was addressed with improved input validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. A local attacker may be able to modify the state of the Keychain.
Published: 2026-05-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper input validation allows a local attacker to modify the state of the Keychain, potentially inserting, altering, or deleting credentials and secrets stored on the device. This flaw can undermine the confidentiality and integrity of stored sensitive information and could facilitate authentication bypass or credential theft. The weakness aligns with CWE‑20: Improper Input Validation.

Affected Systems

This vulnerability affects Apple’s operating systems on iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. Versions addressed by Apple’s patch include iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4. Devices running earlier releases remain vulnerable.

Risk and Exploitability

The attack vector is local; an attacker must be on the device or have local access to alter Keychain entries. The CVSS score of 7.5 indicates high severity, but the EPSS score of < 1% suggests a very low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. While no public exploit has been documented, the impact on key management and credential protection raises the severity for systems where Keychain is central to security. Updating to the patched OS versions mitigates the risk.

Generated by OpenCVE AI on May 12, 2026 at 15:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device to the latest Apple OS releases that contain the Keychain fix.
  • Reboot the device after the update to ensure all changes are applied.
  • Review or temporarily disable any third‑party applications that have elevated Keychain access until the patch is fully verified.

Generated by OpenCVE AI on May 12, 2026 at 15:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 16:15:00 +0000

Type Values Removed Values Added
Title Local attacker can modify Keychain state via input validation flaw

Tue, 12 May 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Mon, 11 May 2026 22:00:00 +0000

Type Values Removed Values Added
Title Local attacker can modify Keychain state via input validation flaw
Weaknesses CWE-20

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved input validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. A local attacker may be able to modify the state of the Keychain.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-12T13:32:12.672Z

Reserved: 2026-03-03T16:36:03.972Z

Link: CVE-2026-28860

cve-icon Vulnrichment

Updated: 2026-05-12T13:32:08.417Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-11T21:18:51.707

Modified: 2026-05-12T15:46:29.583

Link: CVE-2026-28860

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T16:00:13Z

Weaknesses