CVE-2025-46301: A malicious HID device may cause an unexpected process crash in Apple macOS
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
AI Analysis
Technical Summary
CVE-2025-46301 is a vulnerability identified in Apple macOS and related Apple operating systems that allows a malicious Human Interface Device (HID) to cause an unexpected process crash. The root cause is insufficient bounds checking in the handling of HID input data, classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). This vulnerability can be triggered when a specially crafted HID device sends malformed input data, leading to memory corruption that crashes a process unexpectedly. The impact is limited to availability, causing denial-of-service (DoS) conditions without affecting confidentiality or integrity. The vulnerability requires user interaction, such as connecting or interacting with the malicious HID device, and can be exploited remotely with network access (AV:A). The attack complexity is low (AC:L), and no privileges are required (PR:N). The vulnerability affects unspecified versions of macOS prior to the patched versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. Apple addressed the issue by implementing improved bounds checks to prevent memory corruption. No known exploits have been reported in the wild, but the vulnerability poses a risk of service disruption, especially in environments where untrusted peripherals or network HID emulation is possible.
Potential Impact
The primary impact of CVE-2025-46301 is denial of service through unexpected process crashes on affected Apple devices. This can disrupt user productivity and critical services running on macOS, iOS, and iPadOS platforms. Organizations relying heavily on Apple hardware for business operations, especially those with sensitive or real-time applications, may experience operational interruptions. Although the vulnerability does not compromise confidentiality or integrity, repeated crashes could lead to system instability or potential escalation if combined with other vulnerabilities. The ease of exploitation and lack of required privileges increase the risk in environments where users might connect untrusted HID devices or where network-based HID emulation attacks are feasible. This could affect enterprise environments, government agencies, and critical infrastructure sectors using Apple devices. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
Organizations should prioritize updating all affected Apple devices to the patched versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. Beyond patching, implement strict controls on the use of external HID devices by enforcing device whitelisting and restricting USB ports to trusted peripherals only. Employ endpoint security solutions capable of detecting anomalous HID behavior or unauthorized device connections. Network segmentation can reduce exposure to network-based HID emulation attacks. User education is critical to prevent interaction with unknown or suspicious devices. For high-security environments, consider disabling unused HID interfaces or using software policies to limit HID device functionality. Continuous monitoring for unusual process crashes or HID-related anomalies can aid early detection of exploitation attempts. Finally, maintain up-to-date inventories of Apple devices and their OS versions to ensure timely patch management.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Japan, Australia, South Korea, China, India
CVE-2025-46301: A malicious HID device may cause an unexpected process crash in Apple macOS
Description
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
AI-Powered Analysis
Technical Analysis
CVE-2025-46301 is a vulnerability identified in Apple macOS and related Apple operating systems that allows a malicious Human Interface Device (HID) to cause an unexpected process crash. The root cause is insufficient bounds checking in the handling of HID input data, classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). This vulnerability can be triggered when a specially crafted HID device sends malformed input data, leading to memory corruption that crashes a process unexpectedly. The impact is limited to availability, causing denial-of-service (DoS) conditions without affecting confidentiality or integrity. The vulnerability requires user interaction, such as connecting or interacting with the malicious HID device, and can be exploited remotely with network access (AV:A). The attack complexity is low (AC:L), and no privileges are required (PR:N). The vulnerability affects unspecified versions of macOS prior to the patched versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. Apple addressed the issue by implementing improved bounds checks to prevent memory corruption. No known exploits have been reported in the wild, but the vulnerability poses a risk of service disruption, especially in environments where untrusted peripherals or network HID emulation is possible.
Potential Impact
The primary impact of CVE-2025-46301 is denial of service through unexpected process crashes on affected Apple devices. This can disrupt user productivity and critical services running on macOS, iOS, and iPadOS platforms. Organizations relying heavily on Apple hardware for business operations, especially those with sensitive or real-time applications, may experience operational interruptions. Although the vulnerability does not compromise confidentiality or integrity, repeated crashes could lead to system instability or potential escalation if combined with other vulnerabilities. The ease of exploitation and lack of required privileges increase the risk in environments where users might connect untrusted HID devices or where network-based HID emulation attacks are feasible. This could affect enterprise environments, government agencies, and critical infrastructure sectors using Apple devices. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
Organizations should prioritize updating all affected Apple devices to the patched versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. Beyond patching, implement strict controls on the use of external HID devices by enforcing device whitelisting and restricting USB ports to trusted peripherals only. Employ endpoint security solutions capable of detecting anomalous HID behavior or unauthorized device connections. Network segmentation can reduce exposure to network-based HID emulation attacks. User education is critical to prevent interaction with unknown or suspicious devices. For high-security environments, consider disabling unused HID interfaces or using software policies to limit HID device functionality. Continuous monitoring for unusual process crashes or HID-related anomalies can aid early detection of exploitation attempts. Finally, maintain up-to-date inventories of Apple devices and their OS versions to ensure timely patch management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-22T21:13:49.960Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698d0dc44b57a58fa1d95098
Added to database: 2/11/2026, 11:16:20 PM
Last enriched: 2/19/2026, 1:32:33 PM
Last updated: 2/20/2026, 9:35:29 PM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27120: CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in vapor leaf-kit
MediumCVE-2026-27118: CWE-346: Origin Validation Error in sveltejs kit
MediumCVE-2026-27112: CWE-863: Incorrect Authorization in akuity kargo
CriticalCVE-2026-27111: CWE-862: Missing Authorization in akuity kargo
MediumCVE-2026-2857: Stack-based Buffer Overflow in D-Link DWR-M960
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.