Description
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. An app may be able to cause unexpected system termination or write kernel memory.
Published: 2026-05-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An out‑of‑bounds write in system input validation code allows a malicious application to corrupt kernel memory, potentially leading to crash or arbitrary code execution. The flaw is a classic buffer overflow vulnerability (CWE‑787). The impact ranges from unexpected system termination to privileged code execution on the affected device.

Affected Systems

Apple operating systems Apple iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected, with the flaw fixed in the following releases: iOS 18.7.9 and 26.5, iPadOS 18.7.9 and 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, and watchOS 26.5. Devices running earlier versions than these releases remain vulnerable.

Risk and Exploitability

Based on the description, the likely attack vector is an application that runs in user space and exploits the flaw to write kernel memory; this can occur from a malicious or compromised third‑party app. The EPSS score is < 1% and the vulnerability is not listed in the CISA KEV catalog. The CVSS score of 6.5 indicates medium severity, yet the memory corruption nature suggests a strong potential for exploitation. No public exploits are known at the time of this analysis, but the oversight in kernel memory handling warrants proactive mitigation.

Generated by OpenCVE AI on May 12, 2026 at 22:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest OS update for your Apple device, ensuring it is at or above the fixed release (iOS 18.7.9 or 26.5, iPadOS 18.7.9 or 26.5, macOS Sequoia 15.7.7 / Sonoma 14.8.7 / Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5).
  • After updating macOS, perform a full system restart to load the patched kernel cleanly.
  • Until the patch is applied, restrict installation of third‑party or untrusted applications, and enable automatic update checks to ensure timely delivery of the fix.

Generated by OpenCVE AI on May 12, 2026 at 22:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 21:45:00 +0000

Type Values Removed Values Added
Title Out‑of‑Bounds Write Allowing Kernel Memory Corruption in Apple OS
Weaknesses CWE-119
CWE-789

Tue, 12 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Mon, 11 May 2026 22:45:00 +0000

Type Values Removed Values Added
Title Out‑of‑Bounds Write Allowing Kernel Memory Corruption in Apple OS
Weaknesses CWE-119
CWE-789

Mon, 11 May 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple visionos
Apple watchos

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. An app may be able to cause unexpected system termination or write kernel memory.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-12T17:23:47.380Z

Reserved: 2026-03-03T16:36:03.992Z

Link: CVE-2026-28972

cve-icon Vulnrichment

Updated: 2026-05-12T17:23:40.975Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-11T21:18:57.907

Modified: 2026-05-12T18:16:49.283

Link: CVE-2026-28972

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T22:30:05Z

Weaknesses