HackWatch
! High riskVU Vulnerability

Apple Patches Critical iPhone Vulnerability Allowing FBI to Retrieve Deleted Signal Messages (CVE-2026-28950)

Vulnerability coverage focused on affected versions, exploitability and patch or mitigation decisions.

Exploitability matters here. Check exposed versions, prioritize mitigations and patch first where remote access or privilege escalation is possible.
Apple Patches Critical iPhone Vulnerability Allowing FBI to Retrieve Deleted Signal Messages (CVE-2026-28950)

Editor: Ethan Carter

Published source date: Apr 23, 2026

Last updated: Apr 23, 2026

Incident status: Resolved or patched

Last verified: Apr 23, 2026

Corroborating sources: 9

Resolved or patched. Source coverage indicates that a fix or formal remediation has been published. Verify that updates are applied in your environment.

Ethan Carter is the responsible editor for this article. Leads HackWatch coverage of phishing, active exploitation, breaches and practical response workflows for high-risk cyber incidents. View author profile.

Apple has fixed a high-risk iPhone and iPad vulnerability (CVE-2026-28950) in Notification Services that allowed the FBI to extract deleted Signal message notifications from devices. This flaw caused notifications marked for deletion to be retained unexpectedly, undermining user privacy and Signal’s security guarantees. The patch is crucial for all iPhone and iPad users, especially those relying on encrypted messaging apps. This article consolidates multiple reports to explain the vulnerability, its impact, and concrete steps users should take now to protect their data.

# Apple Patches Critical iPhone Vulnerability Allowing FBI to Retrieve Deleted Signal Messages (CVE-2026-28950)

What happened

In April 2026, Apple released a security update addressing a significant vulnerability in its iOS and iPadOS Notification Services, tracked as CVE-2026-28950. This flaw caused devices to retain notification data that users had deleted, specifically impacting the encrypted messaging app Signal. The FBI reportedly exploited this vulnerability to recover deleted Signal message notifications from a suspect’s iPhone, despite the app itself being removed from the device.

The issue stemmed from how iOS handled notification logs: notifications marked for deletion were not fully purged from the system’s internal databases. This allowed forensic tools to access sensitive message previews that should have been erased, effectively bypassing Signal’s end-to-end encryption protections for deleted content.

Apple’s patch closes this loophole by ensuring that deleted notifications are properly cleared from all system caches and databases, restoring expected privacy guarantees for users.

Confirmed facts

  • The vulnerability is officially designated CVE-2026-28950.
  • It affects Apple’s Notification Services on iPhones and iPads running vulnerable iOS/iPadOS versions.
  • The flaw causes notifications marked for deletion to remain accessible in the device’s notification database.
  • The FBI successfully used this vulnerability to retrieve deleted Signal message notifications from a suspect’s iPhone.
  • Apple has released security updates that fully patch the issue.
  • Apple has not publicly disclosed detailed technical specifics beyond acknowledging the fix.

Who is affected

  • All iPhone and iPad users running iOS or iPadOS versions prior to the April 2026 security update are potentially vulnerable.
  • Users of Signal and other privacy-focused messaging apps that rely on notification content being ephemeral are at heightened risk.
  • Individuals who rely on device deletion or app removal to secure sensitive message content should be aware that prior to this patch, deleted notifications could still be extracted.

What to do now

  1. Update Your Device Immediately: Install the latest iOS or iPadOS update from Apple’s official channels. This patch addresses CVE-2026-28950 and closes the notification retention loophole.
  2. Review Notification Settings: Limit the amount of sensitive information displayed in notifications by adjusting app notification previews and disabling lock screen previews where possible.
  3. Audit Installed Apps: For users concerned about privacy, ensure that apps like Signal are updated to their latest versions, which may include additional protections against notification leaks.
  4. Use Full Disk Encryption and Strong Passcodes: While Apple devices encrypt data by default, reinforcing device security with strong passcodes and biometric locks adds layers of defense against physical extraction.
  5. Be Wary of Physical Device Seizure: Understand that even with patches, physical access to devices can expose data. Use encrypted backups and consider additional encryption tools if handling highly sensitive communications.

How to secure yourself

  • Disable Notification Previews: Go to Settings > Notifications > Show Previews, and select "When Unlocked" or "Never" to prevent sensitive message content from appearing on the lock screen.
  • Enable Two-Factor Authentication (2FA): Protect your Apple ID and app accounts with 2FA to prevent unauthorized access.
  • Regularly Update Software: Keep iOS, iPadOS, and all apps up to date to benefit from the latest security patches.
  • Use Encrypted Messaging Apps Correctly: Signal and similar apps offer disappearing messages and encrypted backups—enable these features.
  • Avoid Jailbreaking: Jailbroken devices are more vulnerable to exploits and forensic extraction.
  • Secure Physical Access: Use strong passcodes and biometric locks to prevent unauthorized physical access to your device.

2026 update

The CVE-2026-28950 vulnerability represents a rare case where a system-level bug in Apple’s notification framework undermined the privacy of encrypted messaging apps. This incident has prompted Apple to reassess how notification data is stored and deleted, leading to more stringent data sanitization policies in iOS 20 and later.

Apple has also increased transparency around security patches, providing more detailed advisories to help users understand risks and mitigation steps. The 2026 patch is part of a broader initiative to harden iOS against forensic data extraction techniques that leverage system artifacts like notification logs.

FAQ

What is CVE-2026-28950?

CVE-2026-28950 is a security vulnerability in Apple’s Notification Services that caused deleted notifications to be retained in device databases, allowing extraction of sensitive message previews.

How did the FBI exploit this bug?

The FBI accessed the notification database on a suspect’s iPhone to retrieve deleted Signal message notifications, bypassing the app’s deletion and encryption mechanisms.

[AdSense Slot: Article Inline]

Are other messaging apps affected?

While the reported case involved Signal, any app that displays sensitive content in notifications could be affected if the device runs vulnerable iOS versions.

Does deleting Signal from my iPhone remove all messages?

Before this patch, deleted Signal messages could still be partially recovered from notification logs. The update ensures proper deletion of such data.

How do I know if my iPhone is vulnerable?

If you have not installed the April 2026 or later iOS/iPadOS updates, your device may be vulnerable.

Will Apple provide more technical details?

Apple has historically limited detailed disclosures but may release more information in future security advisories.

Can forensic tools still extract deleted notifications after the patch?

The patch is designed to prevent retention of deleted notifications, significantly reducing forensic recovery risks.

What if I don’t update my device?

Your device remains vulnerable to notification data extraction, potentially exposing private message content.

How can I protect my privacy in the future?

Keep software updated, restrict notification previews, use encrypted messaging features, and secure physical access to your device.

Why this matters

This vulnerability highlights a critical intersection between operating system design and app-level privacy guarantees. Signal and similar apps rely on ephemeral notifications to protect user conversations. When the OS fails to properly delete notification data, it undermines these protections, exposing users to surveillance and forensic extraction.

The FBI’s ability to exploit this bug demonstrates how even encrypted communications can be compromised through system-level flaws. For privacy-conscious users, this incident underscores the importance of timely software updates and cautious management of notification settings.

Moreover, it raises questions about the transparency and responsiveness of vendors like Apple in disclosing and addressing vulnerabilities that impact user privacy.

Sources and corroboration

This article synthesizes information from multiple trusted cybersecurity sources, including Help Net Security and Bruce Schneier’s security blog. Both sources independently reported on the CVE-2026-28950 vulnerability, the FBI’s exploitation of the bug, and Apple’s subsequent patch release in April 2026.

  • Help Net Security: https://www.helpnetsecurity.com/2026/04/23/cve-2026-28950-iphone-vulnerability-notifications-signal/
  • Bruce Schneier’s blog: https://www.schneier.com/blog/archives/2026/04/fbi-extracts-deleted-signal-messages-from-iphone-notification-database.html

These corroborated reports provide a comprehensive view of the incident and its implications for iPhone users worldwide.

Sources used for this article

bleepingcomputer.com, cybersecuritynews.com, gbhackers.com, Multiple verified sources, secnews.gr, The Hacker News, blog.malwarebytes.com, securityboulevard.com, schneier.com, helpnetsecurity.com

[AdSense Slot: Article Bottom]

Ethan Carter is the responsible editor for this article. Leads HackWatch coverage of phishing, active exploitation, breaches and practical response workflows for high-risk cyber incidents. View author profile.