Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46302: A malicious HID device may cause an unexpected process crash in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2025-46302cvecve-2025-46302
Published: Wed Feb 11 2026 (02/11/2026, 22:58:14 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. A malicious HID device may cause an unexpected process crash.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 02:43:44 UTC

Technical Analysis

CVE-2025-46302 is a vulnerability identified in Apple’s iOS and iPadOS platforms, as well as related Apple operating systems including macOS, tvOS, visionOS, and watchOS. The root cause is a lack of adequate bounds checking when processing input from Human Interface Devices (HIDs). A malicious HID device, when connected to a vulnerable Apple device, can exploit this flaw to cause an unexpected process crash, effectively resulting in a denial of service (DoS) condition. This vulnerability is categorized under CWE-119, which relates to improper restriction of operations within the bounds of a memory buffer. The attack vector requires physical access to the device to connect the malicious HID and user interaction to trigger the vulnerability. The CVSS v3.1 base score is 5.7, indicating medium severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. Apple addressed this vulnerability by improving bounds checks in the affected input handling code. The patches were released in iOS 18.7.5, iPadOS 18.7.5, macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, and watchOS 26.2. No known exploits have been reported in the wild to date.

Potential Impact

The primary impact of CVE-2025-46302 is denial of service through unexpected process crashes caused by malicious HID devices. For organizations, this could translate into temporary loss of device availability, disruption of critical workflows, and potential operational downtime, especially in environments relying heavily on Apple devices for mobile computing or point-of-sale systems. Although the vulnerability does not compromise confidentiality or integrity, repeated exploitation could degrade user trust and productivity. In high-security or sensitive environments, such disruptions could have cascading effects on business continuity and incident response. Since exploitation requires physical access and user interaction, remote attacks are not feasible, limiting the scope but increasing the risk in scenarios where devices are accessible to untrusted individuals. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, making timely patching essential.

Mitigation Recommendations

To mitigate CVE-2025-46302, organizations should: 1) Immediately apply the security updates provided by Apple for iOS 18.7.5, iPadOS 18.7.5, macOS Sequoia 15.7.4, and other affected OS versions to ensure the vulnerability is patched. 2) Enforce strict physical security controls to prevent unauthorized individuals from connecting external HID devices to corporate Apple devices, including the use of port locks or device management policies that restrict USB and Bluetooth device connections. 3) Implement endpoint security solutions capable of monitoring and controlling peripheral device connections, alerting on suspicious HID activity. 4) Educate users about the risks of connecting unknown or untrusted peripherals and encourage vigilance regarding physical device access. 5) For high-risk environments, consider disabling unused HID interfaces or employing mobile device management (MDM) policies to restrict device pairing and peripheral usage. 6) Regularly audit device configurations and update security policies to reflect evolving threats related to physical device access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.960Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dc44b57a58fa1d9509d

Added to database: 2/11/2026, 11:16:20 PM

Last enriched: 4/3/2026, 2:43:44 AM

Last updated: 4/5/2026, 12:47:50 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses