Vulnerability Description
This issue was addressed through improved state management. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, visionOS 26.5. An attacker may be able to track users through their IP address.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Ipados | < 18.7.9 |
| Apple | Iphone Os | < 18.7.9 |
| Apple | Macos | >= 14.0, < 14.8.7 |
| Apple | Visionos | < 26.5 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/127110Release NotesVendor Advisory
- https://support.apple.com/en-us/127111Release NotesVendor Advisory
- https://support.apple.com/en-us/127115Release NotesVendor Advisory
- https://support.apple.com/en-us/127116Release NotesVendor Advisory
- https://support.apple.com/en-us/127117Release NotesVendor Advisory
- https://support.apple.com/en-us/127120Release NotesVendor Advisory
FAQ
What is CVE-2026-28906?
CVE-2026-28906 is a vulnerability with a CVSS score of 7.5 (HIGH). This issue was addressed through improved state management. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, ...
How severe is CVE-2026-28906?
CVE-2026-28906 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28906?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Ipados, Apple Iphone Os, Apple Macos, Apple Visionos.