Description
A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, watchOS 26.5. An app may be able to leak sensitive kernel state.
Published: 2026-05-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A logging mechanism failed to properly redact data, potentially allowing an application to observe sensitive kernel state. The flaw means that, when logs are generated, kernel details might be written in clear text and exposed to adversaries that have access to those logs. The core weakness is a lack of adequate data redaction before persistence of log records, which can lead to unintended disclosure of protected information.

Affected Systems

The vulnerability is present in Apple operating systems including iOS, iPadOS, macOS, tvOS, and watchOS. Affected releases are iOS 18.7.9, iPadOS 18.7.9, iOS 26.5, iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, and watchOS 26.5. Devices running these or older versions are at risk.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity vulnerability, while the EPSS score of <1% suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, so no known active exploitation has been reported. Nevertheless, the flaw can leak kernel‑level data via application logs, providing attackers with information useful for further attacks. The likely attack vector is an application with high privileges that writes detailed logs to the system logging facility.

Generated by OpenCVE AI on May 12, 2026 at 18:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update all Apple devices to a patched OS version (iOS 18.7.9 or later, iPadOS 18.7.9 or later, macOS Sequoia 15.7.7 or later, macOS Sonoma 14.8.7 or later, macOS Tahoe 26.5 or later, tvOS 26.5 or later, watchOS 26.5 or later).
  • Restrict third‑party applications from writing detailed kernel logs by disabling unnecessary logging features or applying app‑level access controls.
  • Configure system logging settings to limit log file read access to privileged users only, ensuring that kernel information is not exposed to non‑privileged accounts.

Generated by OpenCVE AI on May 12, 2026 at 18:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 19:00:00 +0000

Type Values Removed Values Added
Title Logging Redaction Failure Exposes Kernel State

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os

Tue, 12 May 2026 16:30:00 +0000

Type Values Removed Values Added
Title Kernel State Exposure via Improper Log Redaction
Weaknesses CWE-200

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-532
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 23:45:00 +0000

Type Values Removed Values Added
Title Kernel State Exposure via Improper Log Redaction
Weaknesses CWE-200

Mon, 11 May 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple tvos
Apple watchos

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, watchOS 26.5. An app may be able to leak sensitive kernel state.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-12T13:48:31.482Z

Reserved: 2026-03-03T16:36:03.994Z

Link: CVE-2026-28987

cve-icon Vulnrichment

Updated: 2026-05-12T13:48:27.206Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-11T21:18:58.720

Modified: 2026-05-12T17:16:41.177

Link: CVE-2026-28987

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:45:05Z

Weaknesses