CVE-2026-28863 Overview
CVE-2026-28863 is a permissions weakness in multiple Apple operating systems that allows an installed application to fingerprint the user. The flaw stems from insufficient access restrictions on system resources that expose device or user-identifying attributes. Apple resolved the issue by tightening permission checks in iOS 26.4, iPadOS 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4. The weakness maps to [CWE-284] Improper Access Control.
Critical Impact
An application installed on an affected Apple device can collect persistent identifying signals about the user, enabling cross-app tracking and profiling without explicit consent.
Affected Products
- Apple iOS and iPadOS prior to 26.4
- Apple tvOS and watchOS prior to 26.4
- Apple visionOS prior to 26.4
Discovery Timeline
- 2026-03-25 - CVE-2026-28863 published to NVD
- 2026-05-10 - Last updated in NVD database
Technical Details for CVE-2026-28863
Vulnerability Analysis
The vulnerability allows an application to access information that can be combined into a stable fingerprint of the user or device. Fingerprinting on mobile platforms typically aggregates hardware identifiers, configuration values, sensor characteristics, and installed application metadata. Apple's platform privacy model is designed to prevent apps from reading such combinations without entitlements or explicit user consent. CVE-2026-28863 breaks that model by exposing data through an interface that did not enforce sufficient permission checks.
Apple's advisory states the issue was addressed with additional restrictions, indicating the fix narrows which callers can read the affected resource. Successful exploitation does not grant code execution, file access, or data modification. The impact is confined to confidentiality, since fingerprinting data can be used to deanonymize users and correlate behavior across services.
Root Cause
The root cause is improper access control [CWE-284] on a system resource that returns user- or device-identifying values. The component did not apply restrictions consistent with Apple's privacy guarantees, allowing any installed app to query the data without sandbox or entitlement enforcement.
Attack Vector
Exploitation requires an attacker-controlled application to run on the device, and user interaction is required to install or open that app. Once active, the app queries the affected interface and assembles a persistent identifier. The data can then be exfiltrated over the network to a remote tracking service.
No verified proof-of-concept code is publicly available. See the Apple security advisories listed in the references for vendor-supplied technical detail.
Detection Methods for CVE-2026-28863
Indicators of Compromise
- Apple mobile or wearable devices running iOS, iPadOS, tvOS, visionOS, or watchOS below version 26.4.
- Installed third-party applications that issue repeated queries to system APIs returning device or account metadata.
- Outbound traffic from mobile devices to advertising or analytics endpoints not declared in the app's privacy manifest.
Detection Strategies
- Inventory Apple endpoints through mobile device management (MDM) and flag any device not yet on the 26.4 release train.
- Review App Privacy Reports on managed iOS and iPadOS devices for unexpected access to device-identifying data categories.
- Correlate enterprise application allowlists with apps observed performing high-frequency reads of system configuration values.
Monitoring Recommendations
- Enable MDM compliance rules that mark devices below iOS/iPadOS/tvOS/visionOS/watchOS 26.4 as non-compliant.
- Forward MDM and network telemetry into a central data lake or SIEM for correlation against known tracker domains.
- Audit newly installed apps on managed devices and review their declared privacy manifests against observed behavior.
How to Mitigate CVE-2026-28863
Immediate Actions Required
- Update all Apple devices to iOS 26.4, iPadOS 26.4, tvOS 26.4, visionOS 26.4, or watchOS 26.4.
- Push the update through MDM with an enforcement deadline and block non-compliant devices from sensitive resources.
- Remove untrusted or unnecessary third-party applications from managed devices until patching is verified.
Patch Information
Apple released fixes in iOS 26.4, iPadOS 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4. Refer to the vendor advisories: Apple Security Update #126792, Apple Security Update #126797, Apple Security Update #126798, and Apple Security Update #126799.
Workarounds
- Restrict app installation to vetted enterprise catalogs using MDM application allowlisting.
- Disable or remove apps that request broad access to device metadata without a clear business need.
- Educate users to install only apps from trusted publishers and to review privacy reports on their devices.
# Configuration example: verify device build via MDM query or on-device check
sw_vers -productVersion # macOS host check
# On iOS/iPadOS/tvOS/visionOS/watchOS, confirm version 26.4 via Settings > General > About
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


