CVE-2026-28823Improper Access Control in Apple Macos

Severity
4.9MEDIUMNVD
EPSS
0.0%
top 89.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25

Description

A path handling issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26.4. An app with root privileges may be able to delete protected system files.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 1.2 | Impact: 3.6

Affected Packages2 packages

CVEListV5apple/macos< 26.4
NVDapple/macos26.026.4

🔴Vulnerability Details

2
GHSA
GHSA-j9xp-j7mg-j47f: A path handling issue was addressed with improved validation2026-03-25
CVEList
CVE-2026-28823: A path handling issue was addressed with improved validation2026-03-25

🕵️Threat Intelligence

1
Wiz
CVE-2026-28823 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-28823 — Improper Access Control in Apple Macos | cvebase