Description
A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5. An app may be able to cause unexpected system termination or write kernel memory.
Published: 2026-05-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow in the macOS kernel allows a local application to overwrite kernel memory or trigger an unexpected system termination. This flaw is a classic example of uncontrolled buffer size handling (buffer overflow weaknesses). The result is the compromise of system integrity and availability, potentially allowing a malicious process to gain kernel‑level control or force a reboot.

Affected Systems

Apple macOS versions released before Sequoia 15.7.7, Sonoma 14.8.7, and Tahoe 26.5 are vulnerable. The vendor’s security advisory states that the fix is delivered in those versions and newer releases.

Risk and Exploitability

The CVSS score of 7.5 reflects a high‑severity impact, while the EPSS score of < 1 % indicates a very low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, and no public exploit is known. The likely attack vector is a local attacker who can execute a malicious application on the target system, as the flaw requires code execution with sufficient privileges to trigger the overflow. Because the flaw can lead to arbitrary kernel memory writes or a crash, the potential for a full system compromise is significant, though the low EPSS suggests early detection and patching should mitigate exploitation risk.

Generated by OpenCVE AI on May 12, 2026 at 18:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install macOS Sequoia 15.7.7, Sonoma 14.8.7, or Tahoe 26.5 or a later version to receive the corrected kernel bounds checks.
  • If an immediate upgrade is not possible, enable System Integrity Protection and enforce the App Sandbox on local applications to limit kernel access, thereby reducing the impact of a potential overflow.
  • Discontinue or restrict the use of any known applications that trigger the kernel overflow until the system is patched, thereby removing the local vector for exploitation.

Generated by OpenCVE AI on May 12, 2026 at 18:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 18:30:00 +0000

Type Values Removed Values Added
Title Kernel Buffer Overflow Causing System Crash and Memory Corruption in macOS

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Tue, 12 May 2026 16:15:00 +0000

Type Values Removed Values Added
Title Kernel Buffer Overflow Leading to System Crash or Kernel Memory Write
Weaknesses CWE-119

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 22:30:00 +0000

Type Values Removed Values Added
Title Kernel Buffer Overflow Leading to System Crash or Kernel Memory Write
Weaknesses CWE-119

Mon, 11 May 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5. An app may be able to cause unexpected system termination or write kernel memory.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-12T13:30:10.805Z

Reserved: 2026-03-03T16:36:03.987Z

Link: CVE-2026-28925

cve-icon Vulnrichment

Updated: 2026-05-12T13:29:58.307Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-11T21:18:54.823

Modified: 2026-05-12T17:24:42.147

Link: CVE-2026-28925

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:15:21Z

Weaknesses