Description
A null pointer dereference was addressed with improved input validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. A user in a privileged network position may be able to cause a denial-of-service.
Published: 2026-03-25
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

A null pointer dereference vulnerability was identified that could allow an attacker to crash Apple operating systems, resulting in a denial‑of‑service condition for the affected device. The flaw arises when input validation fails, permitting a privileged network user to trigger the faulty code path. This weakness is classified as CWE‑476 – Incorrect Null Dereference. Once triggered, the operating system becomes unresponsive, affecting the availability of all services on the compromised device.

Affected Systems

Apple devices running iOS 18.7.7 or 26.4, iPadOS 18.7.7 or 26.4, macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4, as well as tvOS 26.4, visionOS 26.4, and watchOS 26.4 are impacted. All platforms receive a patch that addresses the null pointer dereference through improved input validation.

Risk and Exploitability

The vulnerability has a CVSS score of 5.9, indicating a moderate risk, and an EPSS score of less than 1 %, suggesting few predicted exploit attempts. It does not appear in the CISA KEV catalog. Based on the description, the likely attack vector is a privileged network user sending crafted input to the device, which can cause the OS to crash. The exploit requires local or network access and does not provide escalation beyond service interruption.

Generated by OpenCVE AI on March 25, 2026 at 19:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update iOS to version 18.7.7 or later or to 26.4 if available
  • Update iPadOS to version 18.7.7 or later or to 26.4 if available
  • Update macOS to Sequoia 15.7.5, Sonoma 14.8.5, or Tahoe 26.4
  • Update tvOS, visionOS, and watchOS to version 26.4

Generated by OpenCVE AI on March 25, 2026 at 19:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Null Pointer Dereference Causing Denial of Service in Multiple Apple OS Versions

Wed, 25 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os

Wed, 25 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Wed, 25 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description A null pointer dereference was addressed with improved input validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. A user in a privileged network position may be able to cause a denial-of-service.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:23:46.042Z

Reserved: 2026-03-03T16:36:03.975Z

Link: CVE-2026-28886

cve-icon Vulnrichment

Updated: 2026-03-25T16:11:41.685Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T01:17:12.157

Modified: 2026-03-25T18:22:10.320

Link: CVE-2026-28886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:16:22Z

Weaknesses