CVE-2026-28995 Overview
CVE-2026-28995 is a sandbox escape vulnerability affecting multiple Apple operating systems. The flaw stems from a logic issue that allowed a malicious application to break out of its sandbox boundary. Apple addressed the weakness with improved restrictions across its operating system portfolio. The vulnerability is categorized under [CWE-269] Improper Privilege Management. Apple patched the issue in iOS 18.7.9, iPadOS 18.7.9, iOS 26.5, iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, and watchOS 26.5.
Critical Impact
A malicious app running on an affected Apple device can escape sandbox restrictions and access resources outside its intended boundary, leading to high impact on confidentiality, integrity, and availability.
Affected Products
- Apple iOS and iPadOS prior to 18.7.9 and prior to 26.5
- Apple macOS Tahoe prior to 26.5
- Apple tvOS, visionOS, and watchOS prior to 26.5
Discovery Timeline
- 2026-05-11 - CVE-2026-28995 published to the National Vulnerability Database (NVD)
- 2026-05-12 - Last updated in NVD database
Technical Details for CVE-2026-28995
Vulnerability Analysis
The vulnerability is a sandbox escape rooted in flawed access control logic within Apple's operating systems. Apple's sandbox is designed to isolate applications from sensitive system resources and from each other. A logic flaw in the enforcement path allowed code running inside the sandbox to perform actions that should have been blocked.
The issue requires local execution, low attack complexity, and low privileges, with no user interaction. Successful exploitation produces a scope change, meaning the impact extends beyond the vulnerable component to other system resources. The exploit prediction scoring places real-world exploitation probability as low, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog.
Root Cause
Apple's advisory describes the root cause as a logic issue addressed with improved restrictions. The sandbox enforcement code did not correctly validate or restrict an operation that crosses the sandbox boundary. This permitted an application with normal sandboxed privileges to reach resources outside its container.
Attack Vector
An attacker must first deliver and execute a malicious application on the target device. Once running, the app abuses the logic flaw to escape sandbox containment. From the escaped context, the attacker can access user data, modify system state, or stage further privilege escalation. No verified proof-of-concept code or public exploit is available for CVE-2026-28995.
// No verified exploitation code is available for CVE-2026-28995.
// Refer to Apple security advisories for technical detail.
Detection Methods for CVE-2026-28995
Indicators of Compromise
- Applications spawning child processes or accessing file paths outside their designated sandbox container
- Unexpected entitlement usage or XPC service interactions originating from third-party applications
- Anomalous access to user data directories or system frameworks from sandboxed apps
Detection Strategies
- Monitor macOS Endpoint Security framework events for sandboxed processes performing file or IPC operations that violate their container scope
- Audit installed applications and their code signatures, flagging unsigned or recently introduced binaries with elevated activity
- Correlate process telemetry with known sandbox profile violations using mobile device management (MDM) reporting on iOS, iPadOS, tvOS, visionOS, and watchOS
Monitoring Recommendations
- Enable verbose logging on macOS via log stream filters targeting com.apple.sandbox events and review for denial-to-allow transitions after updates
- Track operating system version compliance through MDM to confirm devices are running patched builds
- Review crash reports and ReportCrash artifacts for repeated sandbox-related faults that may indicate exploitation attempts
How to Mitigate CVE-2026-28995
Immediate Actions Required
- Update all Apple devices to iOS 18.7.9, iPadOS 18.7.9, iOS 26.5, iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, or watchOS 26.5 as applicable
- Restrict installation of third-party applications to vetted sources and enforce App Store or notarized distribution only
- Inventory and remove unused or untrusted applications across the fleet
Patch Information
Apple released fixes across its product portfolio. Reference the vendor advisories for build numbers and applicability: Apple Support Article #127110, Apple Support Article #127111, Apple Support Article #127115, Apple Support Article #127118, Apple Support Article #127119, and Apple Support Article #127120.
Workarounds
- No vendor-supplied workaround exists; patching is the only supported remediation
- Enforce MDM policies that block sideloading and require automatic OS updates
- Limit installation privileges on macOS endpoints and require administrator approval for new application installs
# Verify macOS build version on managed endpoints
sw_vers -productVersion
sw_vers -buildVersion
# Trigger software update check via command line
sudo softwareupdate --list
sudo softwareupdate --install --all --restart
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


