{"id":2139,"date":"2026-03-25T21:55:35","date_gmt":"2026-03-25T21:55:35","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/"},"modified":"2026-03-25T21:55:35","modified_gmt":"2026-03-25T21:55:35","slug":"apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/","title":{"rendered":"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)"},"content":{"rendered":"<div>\n<p>Apple released the next version of its operating system, patching 85 different vulnerabilities across all of them. None of the vulnerabilities are currently being exploited. The last three macOS &#8220;generations&#8221;\u00a0are covered, as are the last two versions of iOS\/iPadOS. For tvOS, watchOS, and visionOS, only the current version received patches. This update also includes the recently released Background Security Improvements. Some older watchOS versions received updates, but these updates do not address any security issues.<\/p>\n<table class=\"datatable\">\n<thead>\n<tr>\n<th>iOS 26.4 and iPadOS 26.4<\/th>\n<th>iOS 18.7.7 and iPadOS 18.7.7<\/th>\n<th>macOS Tahoe 26.4<\/th>\n<th>macOS Sequoia 15.7.5<\/th>\n<th>macOS Sonoma 14.8.5<\/th>\n<th>tvOS 26.4<\/th>\n<th>watchOS 26.4<\/th>\n<th>visionOS 26.4<\/th>\n<th>Safari 26.4<\/th>\n<th>Xcode 26.4<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2025-43376:<\/b> A remote attacker may be able to view leaked DNS queries with Private Relay turned on.<br \/>\n\t\t\tAffects WebKit<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2025-43534:<\/b> A user with physical access to an iOS device may be able to bypass Activation Lock.<br \/>\n\t\t\tAffects iTunes Store<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20607:<\/b> An app may be able to access protected user data.<br \/>\n\t\t\tAffects libxpc<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20631:<\/b> A user may be able to elevate privileges.<br \/>\n\t\t\tAffects PackageKit<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20632:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects Music<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20633:<\/b> An app may be able to access user-sensitive data.<br \/>\n\t\t\tAffects Archive Utility<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20637:<\/b> An app may be able to cause unexpected system termination.<br \/>\n\t\t\tAffects AppleKeyStore<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20639:<\/b> Processing a maliciously crafted string may lead to heap corruption.<br \/>\n\t\t\tAffects configd<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20643:<\/b> Processing maliciously crafted web content may bypass Same Origin Policy.<br \/>\n\t\t\tAffects WebKit<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20651:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects Messages<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20657:<\/b> Parsing a maliciously crafted file may lead to an unexpected app termination.<br \/>\n\t\t\tAffects Vision<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20660:<\/b> A remote user may be able to write arbitrary files.<br \/>\n\t\t\tAffects CFNetwork<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20665:<\/b> Processing maliciously crafted web content may prevent Content Security Policy from being enforced.<br \/>\n\t\t\tAffects WebKit<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20668:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects Focus<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20684:<\/b> An app may bypass Gatekeeper checks.<br \/>\n\t\t\tAffects AppleScript<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20687:<\/b> An app may be able to cause unexpected system termination or write kernel memory.<br \/>\n\t\t\tAffects Kernel<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20688:<\/b> An app may be able to break out of its sandbox.<br \/>\n\t\t\tAffects Printing<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20690:<\/b> Processing an audio stream in a maliciously crafted media file may terminate the process.<br \/>\n\t\t\tAffects CoreMedia<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20691:<\/b> A maliciously crafted webpage may be able to fingerprint the user.<br \/>\n\t\t\tAffects WebKit Sandboxing<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20692:<\/b> &#8220;Hide IP Address&#8221; and &#8220;Block All Remote Content&#8221; may not apply to all mail content.<br \/>\n\t\t\tAffects Mail<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20693:<\/b> An attacker with root privileges may be able to delete protected system files.<br \/>\n\t\t\tAffects PackageKit<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20694:<\/b> An app may be able to access user-sensitive data.<br \/>\n\t\t\tAffects MigrationKit<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20695:<\/b> An app may be able to determine kernel memory layout.<br \/>\n\t\t\tAffects Kernel<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20697:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects Spotlight<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20698:<\/b> An app may be able to cause unexpected system termination or corrupt kernel memory.<br \/>\n\t\t\tAffects Kernel<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20699:<\/b> An app may be able to access user-sensitive data.<br \/>\n\t\t\tAffects AppleMobileFileIntegrity<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-20701:<\/b> An app may be able to connect to a network share without user consent.<br \/>\n\t\t\tAffects NetAuth<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28816:<\/b> An app may be able to delete files for which it does not have permission.<br \/>\n\t\t\tAffects Notes<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28817:<\/b> A sandboxed process may be able to circumvent sandbox restrictions.<br \/>\n\t\t\tAffects Printing<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28818:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects Spotlight<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28820:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects StorageKit<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28821:<\/b> An app may be able to gain elevated privileges.<br \/>\n\t\t\tAffects CoreServices<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28822:<\/b> An attacker may be able to cause unexpected app termination.<br \/>\n\t\t\tAffects Audio<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28823:<\/b> An app with root privileges may be able to delete protected system files.<br \/>\n\t\t\tAffects Admin Framework<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28824:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects AppleMobileFileIntegrity<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28825:<\/b> An app may be able to modify protected parts of the file system.<br \/>\n\t\t\tAffects SMB<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28826:<\/b> A malicious app may be able to break out of its sandbox.<br \/>\n\t\t\tAffects NSColorPanel<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28827:<\/b> An app may be able to break out of its sandbox.<br \/>\n\t\t\tAffects NetFSFramework<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28828:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects TCC<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28829:<\/b> An app may be able to modify protected parts of the file system.<br \/>\n\t\t\tAffects WebDAV<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28831:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects Printing<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28832:<\/b> An app may be able to disclose kernel memory.<br \/>\n\t\t\tAffects File System<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28833:<\/b> An app may be able to enumerate a user&#8217;s installed apps.<br \/>\n\t\t\tAffects iCloud<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28834:<\/b> An app may be able to cause unexpected system termination.<br \/>\n\t\t\tAffects GPU Drivers<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28835:<\/b> Mounting a maliciously crafted SMB network share may lead to system termination.<br \/>\n\t\t\tAffects SMB<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28837:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects System Settings<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28838:<\/b> An app may be able to break out of its sandbox.<br \/>\n\t\t\tAffects CoreServices<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28839:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects NetAuth<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28841:<\/b> A buffer overflow may result in memory corruption and unexpected app termination.<br \/>\n\t\t\tAffects IOGraphics<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28842:<\/b> A buffer overflow may result in memory corruption and unexpected app termination.<br \/>\n\t\t\tAffects IOGraphics<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28844:<\/b> An attacker may gain access to protected parts of the file system.<br \/>\n\t\t\tAffects SystemMigration<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28845:<\/b> An app may be able to access protected user data.<br \/>\n\t\t\tAffects LaunchServices<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28852:<\/b> An app may be able to cause a denial-of-service.<br \/>\n\t\t\tAffects UIFoundation<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28856:<\/b> An attacker with physical access to a locked device may be able to view sensitive user information.<br \/>\n\t\t\tAffects Siri<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28857:<\/b> Processing maliciously crafted web content may lead to an unexpected process crash.<br \/>\n\t\t\tAffects WebKit<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28858:<\/b> A remote user may be able to cause unexpected system termination or corrupt kernel memory.<br \/>\n\t\t\tAffects Telephony<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28859:<\/b> A malicious website may be able to process restricted web content outside the sandbox.<br \/>\n\t\t\tAffects WebKit<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28861:<\/b> A malicious website may be able to access script message handlers intended for other origins.<br \/>\n\t\t\tAffects WebKit<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28862:<\/b> An app may be able to access user-sensitive data.<br \/>\n\t\t\tAffects Phone<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28863:<\/b> An app may be able to fingerprint the user.<br \/>\n\t\t\tAffects Sandbox Profiles<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28864:<\/b> A local attacker may gain access to user&#8217;s Keychain items.<br \/>\n\t\t\tAffects Security<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28865:<\/b> An attacker in a privileged network position may be able to intercept network traffic.<br \/>\n\t\t\tAffects 802.1X<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28866:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects Clipboard<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28867:<\/b> An app may be able to leak sensitive kernel state.<br \/>\n\t\t\tAffects Kernel<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28868:<\/b> An app may be able to disclose kernel memory.<br \/>\n\t\t\tAffects Kernel<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28870:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects GeoServices<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28871:<\/b> Visiting a maliciously crafted website may lead to a cross-site scripting attack.<br \/>\n\t\t\tAffects WebKit<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28874:<\/b> A remote attacker may cause an unexpected app termination.<br \/>\n\t\t\tAffects Baseband<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28875:<\/b> A remote attacker may be able to cause a denial-of-service.<br \/>\n\t\t\tAffects Baseband<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28876:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects DeviceLink<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28877:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects Accounts<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28878:<\/b> An app may be able to enumerate a user&#8217;s installed apps.<br \/>\n\t\t\tAffects Crash Reporter<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28879:<\/b> Processing maliciously crafted web content may lead to an unexpected process crash.<br \/>\n\t\t\tAffects Audio<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28880:<\/b> An app may be able to enumerate a user&#8217;s installed apps.<br \/>\n\t\t\tAffects iCloud<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28881:<\/b> An app may be able to access sensitive user data.<br \/>\n\t\t\tAffects iCloud<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28882:<\/b> An app may be able to enumerate a user&#8217;s installed apps.<br \/>\n\t\t\tAffects libxpc<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28886:<\/b> A user in a privileged network position may be able to cause a denial-of-service.<br \/>\n\t\t\tAffects CoreUtils<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28888:<\/b> An app may be able to gain root privileges.<br \/>\n\t\t\tAffects CUPS<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28889:<\/b> An app may be able to read arbitrary files as root.<br \/>\n\t\t\tAffects Simulator<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28890:<\/b> An app may be able to cause unexpected system termination.<br \/>\n\t\t\tAffects otool<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28891:<\/b> An app may be able to break out of its sandbox.<br \/>\n\t\t\tAffects NetAuth<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28892:<\/b> An app may be able to modify protected parts of the file system.<br \/>\n\t\t\tAffects Diagnostics<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28893:<\/b> A document may be written to a temporary file when using print preview.<br \/>\n\t\t\tAffects CUPS<\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28894:<\/b> A remote attacker may be able to cause a denial-of-service.<br \/>\n\t\t\tAffects Calling Framework<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td align=\"center\" colspan=\"10\"><b>CVE-2026-28895:<\/b> An attacker with physical access to an iOS device with Stolen Device Protection enabled may be able to access biometrics-gated Protected Apps with the passcode.<br \/>\n\t\t\tAffects App Protection<\/td>\n<\/tr>\n<tr>\n<td>x<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&#8212;<br \/>\nJohannes B. Ullrich, Ph.D. , Dean of Research, <a href=\"https:\/\/sans.edu\/\">SANS.edu<\/a><br \/>\n<a href=\"https:\/\/jbu.me\/164\">Twitter<\/a>|<\/p>\n<p> (c) SANS Internet Storm Center. https:\/\/isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Apple released the next version of its operating system, patching 85 different vulnerabilities across all of them. None of the vulnerabilities are currently being exploited. The last three macOS &#8220;generations&#8221;\u00a0are covered, as are the last two versions of iOS\/iPadOS. For tvOS, watchOS, and visionOS, only the current version received patches. This update also includes the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90],"tags":[91],"class_list":["post-2139","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th) - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th) - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Apple released the next version of its operating system, patching 85 different vulnerabilities across all of them. None of the vulnerabilities are currently being exploited. The last three macOS &#8220;generations&#8221;\u00a0are covered, as are the last two versions of iOS\/iPadOS. For tvOS, watchOS, and visionOS, only the current version received patches. This update also includes the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-25T21:55:35+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)\",\"datePublished\":\"2026-03-25T21:55:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/\"},\"wordCount\":1738,\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/\",\"name\":\"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th) - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-03-25T21:55:35+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th) - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/","og_locale":"en_US","og_type":"article","og_title":"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th) - Imperative Business Ventures Limited","og_description":"Apple released the next version of its operating system, patching 85 different vulnerabilities across all of them. None of the vulnerabilities are currently being exploited. The last three macOS &#8220;generations&#8221;\u00a0are covered, as are the last two versions of iOS\/iPadOS. For tvOS, watchOS, and visionOS, only the current version received patches. This update also includes the [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-03-25T21:55:35+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)","datePublished":"2026-03-25T21:55:35+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/"},"wordCount":1738,"keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/","name":"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th) - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-03-25T21:55:35+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/25\/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2139"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2139\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}