PT-2026-39829 · Apple · Macos Tahoe+7
Alex Radocea
·
Published
2026-05-11
·
Updated
2026-05-12
·
CVE-2026-28994
CVSS v3.1
5.3
Medium
| Vector | AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
iOS versions prior to 18.7.9
iOS versions prior to 26.5
iPadOS versions prior to 18.7.9
iPadOS versions prior to 26.5
macOS Sequoia versions prior to 15.7.7
macOS Sonoma versions prior to 14.8.7
macOS Tahoe versions prior to 26.5
tvOS versions prior to 26.5
watchOS versions prior to 26.5
Description
A use-after-free issue—a memory corruption flaw where a program continues to use a pointer after it has been freed—exists in the Wi-Fi component. This flaw is pre-authentication and requires no user interaction. An attacker in a privileged network position can exploit this by sending crafted Wi-Fi packets to cause a denial-of-service attack.
Recommendations
Update iOS to version 18.7.9 or 26.5
Update iPadOS to version 18.7.9 or 26.5
Update macOS Sequoia to version 15.7.7
Update macOS Sonoma to version 14.8.7
Update macOS Tahoe to version 26.5
Update tvOS to version 26.5
Update watchOS to version 26.5
Fix
DoS
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Apple Macos
Ios
Ipados
Macos Sequoia
Macos Sonoma
Macos Tahoe
Tvos
Watchos