CVE-2026-28858
Apple · iOS and iPadOS
A buffer overflow vulnerability in the kernel was addressed through improved bounds checking. Remote attackers may cause system termination or corrupt kernel memory.
Executive summary
Apple iOS and iPadOS devices are vulnerable to a critical kernel-level buffer overflow that allows remote attackers to cause system crashes or achieve arbitrary memory corruption.
Vulnerability
This vulnerability is a classic buffer overflow residing within the kernel memory management. A remote, unauthenticated user can trigger this flaw by sending specially crafted data that bypasses insufficient bounds checking, leading to system instability or potential kernel-mode code execution.
Business impact
A successful exploit of this vulnerability poses a severe risk to organizational data integrity and availability. Because the flaw exists at the kernel level, an attacker could potentially gain full control over the affected mobile device, leading to the theft of sensitive corporate data, surveillance, or complete device bricking. The CVSS score of 9.8 reflects the critical nature of remote reachability combined with high impact on system confidentiality and integrity.
Remediation
Immediate Action: Administrators must ensure all managed Apple devices are updated to iOS 26.4 or iPadOS 26.4 immediately to apply the necessary bounds-checking patches.
Proactive Monitoring: Utilize Mobile Device Management (MDM) solutions to audit OS versions across the fleet and identify non-compliant devices.
Compensating Controls: Restrict network access for unpatched devices using NAC (Network Access Control) solutions until the update is confirmed.
Exploitation status
Public Exploit Available: No
Analyst recommendation
This vulnerability represents a significant risk to the mobile perimeter. Given the remote nature of the attack vector and the critical CVSS score of 9.8, the threat must be treated with the highest priority. Organizations should enforce the update to version 26.4 within 24-48 hours to mitigate the risk of remote kernel compromise.