Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46302: A malicious HID device may cause an unexpected process crash in Apple macOS

0
Medium
VulnerabilityCVE-2025-46302cvecve-2025-46302
Published: Wed Feb 11 2026 (02/11/2026, 22:58:14 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.

AI-Powered Analysis

AILast updated: 02/19/2026, 13:32:54 UTC

Technical Analysis

CVE-2025-46302 is a vulnerability identified in Apple macOS and related Apple operating systems, including iOS and iPadOS, that allows a malicious Human Interface Device (HID) to cause an unexpected process crash. The root cause is a lack of proper bounds checking (classified under CWE-119), which can be exploited by specially crafted input from a malicious HID device. This vulnerability leads to a denial-of-service (DoS) condition by crashing processes, potentially disrupting user activities or critical system functions. The attack vector is local (AV:A) requiring user interaction (UI:R), meaning an attacker must have physical or logical access to connect a malicious HID device and the user must interact with it to trigger the crash. The vulnerability does not affect confidentiality or integrity but impacts availability. Apple has addressed this issue by improving bounds checks in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. No public exploits have been reported, and the vulnerability was reserved in April 2025 and published in February 2026. The CVSS v3.1 base score is 5.7, reflecting a medium severity due to the limited impact scope and exploitation requirements.

Potential Impact

The primary impact of CVE-2025-46302 is denial of service through unexpected process crashes caused by malicious HID devices. For organizations, this could lead to temporary disruption of critical applications or system processes, potentially affecting productivity and operational continuity. While the vulnerability does not compromise data confidentiality or integrity, repeated or targeted exploitation could degrade system reliability and user trust. Environments with high physical access control risks, such as public kiosks, shared workstations, or conference rooms, are particularly vulnerable. Additionally, organizations relying heavily on Apple devices for critical operations may face increased risk of service interruptions. Since exploitation requires user interaction and physical or logical access to connect a malicious HID, remote exploitation is less likely unless combined with social engineering or insider threats.

Mitigation Recommendations

To mitigate CVE-2025-46302, organizations should prioritize updating affected Apple devices to the patched versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. Beyond patching, implement strict physical security controls to prevent unauthorized connection of external devices, including USB and other HID interfaces. Employ endpoint security solutions that can detect and block unrecognized or suspicious HID devices. Educate users about the risks of connecting unknown peripherals and enforce policies restricting the use of personal or untrusted devices. For high-security environments, consider disabling unused USB ports or using USB port locks. Monitoring system logs for unusual device connection events can help detect attempted exploitation. Finally, incorporate HID device management into broader device control and asset management strategies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.960Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dc44b57a58fa1d9509d

Added to database: 2/11/2026, 11:16:20 PM

Last enriched: 2/19/2026, 1:32:54 PM

Last updated: 2/21/2026, 12:21:32 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats