Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46301: A malicious HID device may cause an unexpected process crash in Apple macOS

0
Medium
VulnerabilityCVE-2025-46301cvecve-2025-46301
Published: Wed Feb 11 2026 (02/11/2026, 22:58:46 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.

AI-Powered Analysis

AILast updated: 02/19/2026, 13:32:33 UTC

Technical Analysis

CVE-2025-46301 is a vulnerability identified in Apple macOS and related Apple operating systems that allows a malicious Human Interface Device (HID) to cause an unexpected process crash. The root cause is insufficient bounds checking in the handling of HID input data, classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). This vulnerability can be triggered when a specially crafted HID device sends malformed input data, leading to memory corruption that crashes a process unexpectedly. The impact is limited to availability, causing denial-of-service (DoS) conditions without affecting confidentiality or integrity. The vulnerability requires user interaction, such as connecting or interacting with the malicious HID device, and can be exploited remotely with network access (AV:A). The attack complexity is low (AC:L), and no privileges are required (PR:N). The vulnerability affects unspecified versions of macOS prior to the patched versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. Apple addressed the issue by implementing improved bounds checks to prevent memory corruption. No known exploits have been reported in the wild, but the vulnerability poses a risk of service disruption, especially in environments where untrusted peripherals or network HID emulation is possible.

Potential Impact

The primary impact of CVE-2025-46301 is denial of service through unexpected process crashes on affected Apple devices. This can disrupt user productivity and critical services running on macOS, iOS, and iPadOS platforms. Organizations relying heavily on Apple hardware for business operations, especially those with sensitive or real-time applications, may experience operational interruptions. Although the vulnerability does not compromise confidentiality or integrity, repeated crashes could lead to system instability or potential escalation if combined with other vulnerabilities. The ease of exploitation and lack of required privileges increase the risk in environments where users might connect untrusted HID devices or where network-based HID emulation attacks are feasible. This could affect enterprise environments, government agencies, and critical infrastructure sectors using Apple devices. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.

Mitigation Recommendations

Organizations should prioritize updating all affected Apple devices to the patched versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. Beyond patching, implement strict controls on the use of external HID devices by enforcing device whitelisting and restricting USB ports to trusted peripherals only. Employ endpoint security solutions capable of detecting anomalous HID behavior or unauthorized device connections. Network segmentation can reduce exposure to network-based HID emulation attacks. User education is critical to prevent interaction with unknown or suspicious devices. For high-security environments, consider disabling unused HID interfaces or using software policies to limit HID device functionality. Continuous monitoring for unusual process crashes or HID-related anomalies can aid early detection of exploitation attempts. Finally, maintain up-to-date inventories of Apple devices and their OS versions to ensure timely patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.960Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dc44b57a58fa1d95098

Added to database: 2/11/2026, 11:16:20 PM

Last enriched: 2/19/2026, 1:32:33 PM

Last updated: 2/20/2026, 9:35:29 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats