Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 25 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Sandbox Bypass via Race Condition in macOS |
Wed, 25 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
Wed, 25 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-362 | |
| Metrics |
cvssV3_1
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos |
|
| Vendors & Products |
Apple
Apple macos |
Wed, 25 Mar 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A race condition was addressed with improved state handling. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. A sandboxed process may be able to circumvent sandbox restrictions. | |
| References |
|
Status: PUBLISHED
Assigner: apple
Published:
Updated: 2026-04-02T18:17:27.903Z
Reserved: 2026-03-03T16:36:03.967Z
Link: CVE-2026-28817
Updated: 2026-03-25T14:34:01.086Z
Status : Analyzed
Published: 2026-03-25T01:17:06.980
Modified: 2026-03-25T20:52:51.803
Link: CVE-2026-28817
No data.
OpenCVE Enrichment
Updated: 2026-03-25T21:27:41Z