Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46290: A remote attacker may be able to cause a denial-of-service in Apple macOS

0
High
VulnerabilityCVE-2025-46290cvecve-2025-46290
Published: Wed Feb 11 2026 (02/11/2026, 22:58:34 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. A remote attacker may be able to cause a denial-of-service.

AI-Powered Analysis

AILast updated: 02/19/2026, 14:03:45 UTC

Technical Analysis

CVE-2025-46290 is a logic flaw vulnerability in Apple macOS that enables a remote attacker to cause a denial-of-service (DoS) condition. The issue stems from insufficient validation or improper logic checks within a component of macOS, which can be triggered remotely without any authentication or user interaction. The vulnerability affects unspecified versions of macOS prior to the patched releases, macOS Sequoia 15.7.4 and macOS Sonoma 14.8.4, where Apple implemented improved validation checks to mitigate the issue. The vulnerability is classified under CWE-703 (Improper Check or Handling of Exceptional Conditions) and CWE-693 (Protection Mechanism Failure), indicating that the system fails to properly handle certain exceptional states, leading to resource exhaustion or crash conditions. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning the attack is network-based, requires no privileges or user interaction, and impacts availability only. Although no exploits have been observed in the wild, the ease of exploitation and potential for service disruption make this a significant threat. The vulnerability could be exploited by sending specially crafted network packets or requests that trigger the logic flaw, causing the affected system to crash or become unresponsive, resulting in denial of service.

Potential Impact

The primary impact of CVE-2025-46290 is denial of service, which can disrupt business operations, degrade user experience, and potentially cause downtime for critical systems running macOS. Organizations relying on macOS for endpoint devices, servers, or network infrastructure may face interruptions if targeted by attackers exploiting this vulnerability. While confidentiality and integrity are not directly affected, the loss of availability can impede productivity and service delivery. In environments with high dependency on macOS systems, such as creative industries, software development, and enterprise environments with Apple hardware, the impact could be significant. Additionally, denial-of-service conditions could be leveraged as part of multi-stage attacks or to distract security teams during other malicious activities. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the risk of widespread exploitation if the vulnerability is weaponized.

Mitigation Recommendations

To mitigate CVE-2025-46290, organizations should immediately apply the security updates provided by Apple in macOS Sequoia 15.7.4 and macOS Sonoma 14.8.4 or later versions. Beyond patching, network-level protections such as intrusion detection/prevention systems (IDS/IPS) should be configured to monitor and block anomalous traffic patterns that could exploit this logic flaw. Network segmentation and limiting exposure of macOS systems to untrusted networks can reduce the attack surface. Employing rate limiting and traffic filtering on services accessible remotely can help prevent exploitation attempts. Regular vulnerability scanning and penetration testing focused on macOS environments can identify residual risks. Additionally, organizations should maintain robust incident response plans to quickly detect and respond to denial-of-service incidents. Monitoring system logs and network traffic for signs of crashes or unusual activity related to this vulnerability is recommended. Finally, educating IT staff about this specific threat ensures timely recognition and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.959Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dc44b57a58fa1d9508f

Added to database: 2/11/2026, 11:16:20 PM

Last enriched: 2/19/2026, 2:03:45 PM

Last updated: 2/21/2026, 12:18:19 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats