PT-2026-39829 · Apple · Macos Tahoe+7

Alex Radocea

·

Published

2026-05-11

·

Updated

2026-05-12

·

CVE-2026-28994

CVSS v3.1

5.3

Medium

VectorAV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions iOS versions prior to 18.7.9 iOS versions prior to 26.5 iPadOS versions prior to 18.7.9 iPadOS versions prior to 26.5 macOS Sequoia versions prior to 15.7.7 macOS Sonoma versions prior to 14.8.7 macOS Tahoe versions prior to 26.5 tvOS versions prior to 26.5 watchOS versions prior to 26.5
Description A use-after-free issue—a memory corruption flaw where a program continues to use a pointer after it has been freed—exists in the Wi-Fi component. This flaw is pre-authentication and requires no user interaction. An attacker in a privileged network position can exploit this by sending crafted Wi-Fi packets to cause a denial-of-service attack.
Recommendations Update iOS to version 18.7.9 or 26.5 Update iPadOS to version 18.7.9 or 26.5 Update macOS Sequoia to version 15.7.7 Update macOS Sonoma to version 14.8.7 Update macOS Tahoe to version 26.5 Update tvOS to version 26.5 Update watchOS to version 26.5

Fix

DoS

Use After Free

Weakness Enumeration

Related Identifiers

CVE-2026-28994

Affected Products

Apple Macos
Ios
Ipados
Macos Sequoia
Macos Sonoma
Macos Tahoe
Tvos
Watchos