macOS Sandbox Race Condition Exploit (fixed 15.7.5/14.8.5/26.4)
CVE-2026-28891 Published on March 25, 2026

A race condition was addressed with additional validation. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to break out of its sandbox.

NVD

Vulnerability Analysis

CVE-2026-28891 can be exploited with local system access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a Race Condition Vulnerability?

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

CVE-2026-28891 has been classified to as a Race Condition vulnerability or weakness.


Products Associated with CVE-2026-28891

stack.watch emails you whenever new vulnerabilities are published in Apple macOS or Apple Macos Sonoma. Just hit a watch button to start following.

 
 

Affected Versions

Apple macOS: