CVE-2025-46302: A malicious HID device may cause an unexpected process crash in Apple macOS
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
AI Analysis
Technical Summary
CVE-2025-46302 is a vulnerability identified in Apple macOS and related Apple operating systems, including iOS and iPadOS, that allows a malicious Human Interface Device (HID) to cause an unexpected process crash. The root cause is a lack of proper bounds checking (classified under CWE-119), which can be exploited by specially crafted input from a malicious HID device. This vulnerability leads to a denial-of-service (DoS) condition by crashing processes, potentially disrupting user activities or critical system functions. The attack vector is local (AV:A) requiring user interaction (UI:R), meaning an attacker must have physical or logical access to connect a malicious HID device and the user must interact with it to trigger the crash. The vulnerability does not affect confidentiality or integrity but impacts availability. Apple has addressed this issue by improving bounds checks in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. No public exploits have been reported, and the vulnerability was reserved in April 2025 and published in February 2026. The CVSS v3.1 base score is 5.7, reflecting a medium severity due to the limited impact scope and exploitation requirements.
Potential Impact
The primary impact of CVE-2025-46302 is denial of service through unexpected process crashes caused by malicious HID devices. For organizations, this could lead to temporary disruption of critical applications or system processes, potentially affecting productivity and operational continuity. While the vulnerability does not compromise data confidentiality or integrity, repeated or targeted exploitation could degrade system reliability and user trust. Environments with high physical access control risks, such as public kiosks, shared workstations, or conference rooms, are particularly vulnerable. Additionally, organizations relying heavily on Apple devices for critical operations may face increased risk of service interruptions. Since exploitation requires user interaction and physical or logical access to connect a malicious HID, remote exploitation is less likely unless combined with social engineering or insider threats.
Mitigation Recommendations
To mitigate CVE-2025-46302, organizations should prioritize updating affected Apple devices to the patched versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. Beyond patching, implement strict physical security controls to prevent unauthorized connection of external devices, including USB and other HID interfaces. Employ endpoint security solutions that can detect and block unrecognized or suspicious HID devices. Educate users about the risks of connecting unknown peripherals and enforce policies restricting the use of personal or untrusted devices. For high-security environments, consider disabling unused USB ports or using USB port locks. Monitoring system logs for unusual device connection events can help detect attempted exploitation. Finally, incorporate HID device management into broader device control and asset management strategies.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil, Netherlands, Sweden, Singapore
CVE-2025-46302: A malicious HID device may cause an unexpected process crash in Apple macOS
Description
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
AI-Powered Analysis
Technical Analysis
CVE-2025-46302 is a vulnerability identified in Apple macOS and related Apple operating systems, including iOS and iPadOS, that allows a malicious Human Interface Device (HID) to cause an unexpected process crash. The root cause is a lack of proper bounds checking (classified under CWE-119), which can be exploited by specially crafted input from a malicious HID device. This vulnerability leads to a denial-of-service (DoS) condition by crashing processes, potentially disrupting user activities or critical system functions. The attack vector is local (AV:A) requiring user interaction (UI:R), meaning an attacker must have physical or logical access to connect a malicious HID device and the user must interact with it to trigger the crash. The vulnerability does not affect confidentiality or integrity but impacts availability. Apple has addressed this issue by improving bounds checks in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. No public exploits have been reported, and the vulnerability was reserved in April 2025 and published in February 2026. The CVSS v3.1 base score is 5.7, reflecting a medium severity due to the limited impact scope and exploitation requirements.
Potential Impact
The primary impact of CVE-2025-46302 is denial of service through unexpected process crashes caused by malicious HID devices. For organizations, this could lead to temporary disruption of critical applications or system processes, potentially affecting productivity and operational continuity. While the vulnerability does not compromise data confidentiality or integrity, repeated or targeted exploitation could degrade system reliability and user trust. Environments with high physical access control risks, such as public kiosks, shared workstations, or conference rooms, are particularly vulnerable. Additionally, organizations relying heavily on Apple devices for critical operations may face increased risk of service interruptions. Since exploitation requires user interaction and physical or logical access to connect a malicious HID, remote exploitation is less likely unless combined with social engineering or insider threats.
Mitigation Recommendations
To mitigate CVE-2025-46302, organizations should prioritize updating affected Apple devices to the patched versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. Beyond patching, implement strict physical security controls to prevent unauthorized connection of external devices, including USB and other HID interfaces. Employ endpoint security solutions that can detect and block unrecognized or suspicious HID devices. Educate users about the risks of connecting unknown peripherals and enforce policies restricting the use of personal or untrusted devices. For high-security environments, consider disabling unused USB ports or using USB port locks. Monitoring system logs for unusual device connection events can help detect attempted exploitation. Finally, incorporate HID device management into broader device control and asset management strategies.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-22T21:13:49.960Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698d0dc44b57a58fa1d9509d
Added to database: 2/11/2026, 11:16:20 PM
Last enriched: 2/19/2026, 1:32:54 PM
Last updated: 2/21/2026, 12:21:32 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.