Vulnerability Description
A race condition was addressed with improved state handling. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. A sandboxed process may be able to circumvent sandbox restrictions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Macos | >= 14.0, < 14.8.5 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/126794Release NotesVendor Advisory
- https://support.apple.com/en-us/126795Release NotesVendor Advisory
- https://support.apple.com/en-us/126796Release NotesVendor Advisory
FAQ
What is CVE-2026-28817?
CVE-2026-28817 is a vulnerability with a CVSS score of 8.1 (HIGH). A race condition was addressed with improved state handling. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. A sandboxed process may be able to circumvent sandbox r...
How severe is CVE-2026-28817?
CVE-2026-28817 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28817?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Macos.