Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4. An app may be able to access sensitive user data.
Published: 2026-03-25
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Sensitive User Data
Action: Patch Now
AI Analysis

Impact

A parsing error in the way directory paths are handled enables an application to bypass its intended sandbox and read files that it should not normally access. The flaw allows a malicious or compromised app to reference files outside the app’s directory, potentially exposing personal data, credentials, or other sensitive information. This vulnerability is a form of access‑control failure (CWE‑284).

Affected Systems

Apple iOS, iPadOS, macOS, and visionOS versions released before the patches in iOS 18.7.7, iOS 26.4, iPadOS 18.7.7, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4 are affected. The specific fixes are present only in the versions listed above and later releases.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.5, indicating a high level of severity, but the probability of exploitation is low (EPSS < 1 %) and it is not included in the CISA KEV catalog. Exploitability requires an app that can invoke the flawed path parsing logic, which means the threat is primarily local to the device and depends on the installation of malicious or compromised software. If exploited, the primary impact is a confidentiality breach whereby sensitive files become accessible to the attacker. No remote exploitation vector is documented, so the overall risk is significant but the likelihood remains modest.

Generated by OpenCVE AI on March 26, 2026 at 15:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest iOS, iPadOS, macOS, or visionOS security update that includes the path validation fix (iOS 18.7.7 or later, iOS 26.4 or later, iPadOS 18.7.7 or later, iPadOS 26.4 or later, macOS Sequoia 15.7.5 or later, macOS Sonoma 14.8.5 or later, macOS Tahoe 26.4 or later, visionOS 26.4 or later).
  • Reboot the device after installing the update to ensure all changes take effect.
  • If an update is not yet available, limit the installation of third‑party applications that could exploit the flaw and monitor device logs for abnormal file access.

Generated by OpenCVE AI on March 26, 2026 at 15:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Title Directory Path Parsing Vulnerability Allowing Unintended Sensitive Data Access

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Title Directory Path Parsing Vulnerability Enables Unauthorized File Access
Weaknesses CWE-200
CWE-22

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Directory Path Parsing Vulnerability Enables Unauthorized File Access
Weaknesses CWE-200
CWE-22

Wed, 25 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple visionos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple visionos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4. An app may be able to access sensitive user data.
References

Subscriptions

Apple Ios And Ipados Ipados Iphone Os Macos Visionos
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:15:24.925Z

Reserved: 2026-03-03T16:36:03.974Z

Link: CVE-2026-28876

cve-icon Vulnrichment

Updated: 2026-03-25T20:21:51.102Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T01:17:11.410

Modified: 2026-03-25T21:30:03.073

Link: CVE-2026-28876

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:53:46Z

Weaknesses