Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-28872: Apple iOS & iPadOS Remote Denial-of-Service via Resource Exhaustion
CVE-2026-28872: Apple iOS & iPadOS Remote Denial-of-Service via Resource Exhaustion
SECURITYHIGHCVE-2026-28872

CVE-2026-28872: Apple iOS & iPadOS Remote Denial-of-Service via Resource Exhaustion

A CVSS 7.5 denial-of-service vulnerability in Apple iOS and iPadOS allows a remote attacker to exhaust device resources and crash the operating system without user interaction. Fixed in iOS 18.7.9 and iOS 26.4.

Dylan H.

Security Team

May 12, 2026
5 min read

Affected Products

  • iOS 18.x (all versions before 18.7.9)
  • iPadOS 18.x (all versions before 18.7.9)
  • iOS 26.x (all versions before 26.4)
  • iPadOS 26.x (all versions before 26.4)

Executive Summary

Apple has disclosed CVE-2026-28872, a denial-of-service vulnerability affecting iOS and iPadOS across both the iOS 18 and iOS 26 release trains. The flaw is rooted in insufficient input validation that allows a remote attacker to send specially crafted network or protocol data, triggering uncontrolled resource consumption that can render the device unresponsive.

CVSS Score: 7.5 (High)

The vulnerability was addressed with improved input validation and fixed in iOS 18.7.9 / iPadOS 18.7.9 and iOS 26.4 / iPadOS 26.4, published to the NVD on May 11, 2026.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-28872
CVSS Score7.5 (High)
CWECWE-400: Uncontrolled Resource Consumption
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
Vulnerable PlatformsiOS 18.x, iPadOS 18.x, iOS 26.x, iPadOS 26.x

Affected Products

VendorProductAffected VersionsFixed Version
AppleiOSAll versions before 18.7.918.7.9
AppleiPadOSAll versions before 18.7.918.7.9
AppleiOS 26All versions before 26.426.4
AppleiPadOS 26All versions before 26.426.4

Vulnerability Details

Resource Exhaustion via Malformed Input

The vulnerability exists in a component that processes externally supplied input — likely tied to a network-facing service or protocol parser — that fails to impose adequate limits on resource allocation. When an attacker sends maliciously crafted data, the affected component allocates memory or processing resources without bound until the system is destabilized.

Typical resource exhaustion attack flow:

1. Attacker identifies network-accessible service on target iOS/iPadOS device
2. Attacker crafts malformed packet or protocol message with excessive/recursive data
3. Target device's input handler allocates resources for each malformed input
4. Without proper bounds checking, allocations accumulate unchecked
5. Device memory or CPU becomes exhausted
6. Operating system becomes unresponsive — denial of service achieved
7. Device requires restart to recover (no persistent compromise)

No Authentication Required

The CVSS vector specifies Privileges Required: None and User Interaction: None, meaning exploitation does not require the attacker to authenticate to the device or trick the user into opening a file or link. A remote attacker on the same network — or potentially over the internet if the vulnerable component is internet-facing — can trigger the condition.

Impact: Availability

The primary impact is availability — the targeted device becomes unresponsive and must be restarted. There is no known evidence that this vulnerability enables code execution, data access, or persistent compromise. However, repeated DoS attacks against devices can disrupt critical communications and workflows.


Risk Assessment by Deployment

ContextRisk LevelNotes
Consumer iPhones/iPads (general)MediumDisruptive but self-recovering after restart
Enterprise iOS MDM fleetHighMass DoS could disrupt critical business workflows
Healthcare/clinical devices running iOSHighClinical communication disruption has patient safety implications
Law enforcement / first responder devicesHighCommunication disruption in critical situations
Public Wi-Fi environmentsMedium–HighShared network increases attacker proximity

Recommended Actions

1. Update Immediately

Apply the vendor-supplied patches as soon as possible:

  • iOS 18 users → Update to iOS 18.7.9
  • iPadOS 18 users → Update to iPadOS 18.7.9
  • iOS 26 users → Update to iOS 26.4
  • iPadOS 26 users → Update to iPadOS 26.4
# For MDM-managed enterprise iOS fleets — push update via MDM
# In Apple Business Manager:
# Devices → Software Updates → Deploy 18.7.9 / 26.4
# Enforce deadline to ensure compliance within 72 hours

2. Prioritize High-Risk Device Categories

Enterprise IT and MDM administrators should:

  1. Identify all iOS/iPadOS devices running affected versions via MDM inventory
  2. Flag devices used for critical operations (healthcare, emergency, executive) for immediate priority update
  3. Monitor MDM compliance dashboards to track patch progress
  4. Consider temporary VPN enforcement or network access restrictions for unpatched devices

3. Network Monitoring

Until patched, monitor for signs of exploitation:

IndicatorDescription
Sudden device reboots across multiple unitsPossible mass DoS attempt
Unusual inbound traffic to iOS devices on networkAttacker probing for vulnerable service
MDM heartbeat loss from multiple devices simultaneouslyCoordinated DoS attack

4. Limit Network Exposure

Ensure iOS/iPadOS devices are not exposing unnecessary services to untrusted networks. Enforce Wi-Fi policies that prevent connections to untrusted or open networks without VPN.


Post-Patch Checklist

  1. Confirm updated version — verify iOS 18.7.9 / iPadOS 18.7.9 / iOS 26.4 / iPadOS 26.4 installed on all managed devices
  2. MDM compliance report — generate and retain documentation of update rollout for compliance purposes
  3. No persistent compromise risk — this vulnerability does not enable code execution; post-patch forensic investigation is not required unless unusual activity preceded the update
  4. Review related vulnerabilities — check the Apple Security Updates page for any co-disclosed issues in the same release

References

  • CVE-2026-28872 — NVD
  • Apple Security Updates
  • CWE-400: Uncontrolled Resource Consumption — MITRE

Related Advisories

  • CVE-2025-43510: Apple Multiple Products Improper Locking
  • CVE-2026-20700: Apple iOS Zero-Day DYLD
#CVE#iOS#iPadOS#Apple#DoS#Resource Exhaustion#NVD#Security Updates

Related Articles

CVE-2026-35392: Critical Path Traversal in goshs Go HTTP Server

A critical CVSS 9.8 path traversal vulnerability in goshs, a SimpleHTTPServer written in Go, allows unauthenticated attackers to write arbitrary files via...

4 min read

CVE-2026-33875: Gematik Authenticator Authentication Flow Hijacking (CVSS 9.3)

A critical vulnerability in Gematik Authenticator prior to version 4.16.0 allows attackers to hijack authentication sessions via malicious deep links,...

5 min read

CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability allowing a malicious app to cause unexpected changes in...

6 min read
Back to all Security Alerts