PatchSiren

Apple CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

MEDIUM Apple CVE published 2026-04-22

CVE-2026-28950

Apple addressed a privacy-focused logging issue in iOS and iPadOS that could cause notifications marked for deletion to remain on the device longer than expected. The fix is included in the listed point releases for supported older and current branches. Because the issue involves retained notification data and improved redaction, it is most relevant where sensitive notification content may have been expos [truncated]

MEDIUM Apple CVE published 2026-03-25

CVE-2026-28882

CVE-2026-28882 is a privacy-related Apple issue where an app may be able to enumerate a user's installed apps. Apple says the fix was applied with improved checks, and the CVE is marked as fixed in iOS 18.7.9, iPadOS 18.7.9, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4. NVD rates the issue as local, with no privileges or user interaction required, and low confidentiality impact.

MEDIUM Apple CVE published 2026-03-25

CVE-2026-28878

CVE-2026-28878 is a privacy-focused information disclosure issue in Apple platforms. According to the supplied record, the flaw was addressed by removing sensitive data, and an app may have been able to enumerate a user’s installed apps. Apple released fixes across iOS, iPadOS, macOS, tvOS, visionOS, and watchOS; updating to the listed fixed versions is the primary mitigation.

MEDIUM Apple CVE published 2026-03-25

CVE-2026-28877

Apple disclosed CVE-2026-28877 on 2026-03-25. The issue is described as an authorization problem fixed with improved state management, and Apple says an app may be able to access sensitive user data. Apple’s listed fixes cover iOS 18.7.9 and 26.4, iPadOS 18.7.9 and 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4, and watchOS 26.4. NVD rates the issue as medium severity (CV [truncated]

MEDIUM Apple CVE published 2026-03-25

CVE-2026-28870

CVE-2026-28870 is an Apple information-leakage vulnerability that was addressed with additional validation. According to Apple’s advisory text, an app may be able to access sensitive user data. Apple states the issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4. NVD classifies the issue as a local, low-privilege, no-user-i [truncated]

MEDIUM Apple CVE published 2026-03-25

CVE-2026-28863

Apple has addressed a permissions issue that could let an app fingerprint the user. The public record describes the flaw as a privacy-impacting issue fixed in iOS 26.4, iPadOS 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4. Because the available details are limited, defenders should treat this as a user-tracking risk rather than a code-execution issue and prioritize updates on affected Apple devices.

MEDIUM Apple CVE published 2026-03-25

CVE-2026-28826

Apple addressed CVE-2026-28826 as a logic issue with improved restrictions in macOS. According to Apple’s advisory links, the fix is available in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4. The reported impact is a sandbox breakout by a malicious app, which makes this a meaningful endpoint-hardening issue for fleets that rely on macOS sandbox boundaries to contain untrusted or third-p [truncated]

MEDIUM Apple CVE published 2026-03-25

CVE-2026-20657

Published on 2026-03-25, CVE-2026-20657 describes a buffer overflow in Apple software that was addressed with improved memory handling. Apple states that parsing a maliciously crafted file may lead to an unexpected app termination. The issue is fixed in iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4.

Known exploited Apple CVE published 2026-02-12

CVE-2026-20700

CVE-2026-20700 is a CISA Known Exploited Vulnerabilities (KEV) entry for an Apple multiple products buffer overflow vulnerability. The available corpus does not provide product-specific technical detail or a CVSS score, but it does confirm that CISA added the issue to KEV on 2026-02-12 and set a remediation due date of 2026-03-05. Treat this as an urgent defensive priority and follow Apple’s vendor instru [truncated]

Known exploited Apple CVE published 2025-06-16

CVE-2025-43200

CVE-2025-43200 is listed by CISA as a Known Exploited Vulnerability affecting Apple Multiple Products. In the supplied corpus, the issue is identified as an Apple vulnerability with no public technical specifics, but CISA’s KEV entry confirms it is considered actively exploited. The remediation deadline associated with the KEV entry is 2025-07-07, based on the 2025-06-16 addition date.