CVE-2025-46303: A malicious HID device may cause an unexpected process crash in Apple macOS
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
AI Analysis
Technical Summary
CVE-2025-46303 is a vulnerability identified in Apple macOS and related Apple operating systems (iOS and iPadOS) that involves improper bounds checking in the handling of Human Interface Devices (HIDs). HIDs include peripherals such as keyboards, mice, and other input devices. A maliciously crafted HID device can exploit this flaw to cause an unexpected process crash, effectively resulting in a denial-of-service (DoS) condition. The vulnerability is classified under CWE-119, which relates to improper restriction of operations within the bounds of a memory buffer, indicating a memory safety issue. The CVSS v3.1 base score is 5.7 (medium severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. This means an attacker must have physical or logical proximity to the target device to connect a malicious HID and require the user to interact with it to trigger the crash. The vulnerability was addressed by Apple through improved bounds checks in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. No public exploits or active exploitation have been reported to date. The flaw primarily affects Apple users who connect external HID devices, potentially disrupting normal operations by crashing processes handling these devices.
Potential Impact
The primary impact of CVE-2025-46303 is a denial-of-service condition caused by unexpected process crashes when a malicious HID device is connected. For organizations, this can lead to temporary loss of functionality of affected processes, potentially disrupting user productivity or critical operations relying on HID input. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, repeated or targeted exploitation could cause operational instability, especially in environments with high reliance on Apple devices and external peripherals. The requirement for user interaction and physical or logical proximity limits remote exploitation, reducing the risk of large-scale automated attacks. Nonetheless, organizations with shared workspaces, public access areas, or supply chain exposure to malicious peripherals should be cautious. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future attacks.
Mitigation Recommendations
Organizations should prioritize applying the security updates released by Apple for macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5 to remediate this vulnerability. Beyond patching, organizations should implement strict controls on the use of external HID devices, including restricting or monitoring USB and Bluetooth device connections to Apple systems. Employ endpoint security solutions capable of detecting anomalous device behavior or unauthorized peripheral connections. User education is critical to prevent interaction with unknown or suspicious devices. For high-security environments, consider disabling or limiting HID device usage where feasible or using device whitelisting to allow only trusted peripherals. Regularly audit connected devices and maintain an inventory of authorized hardware. Additionally, implement physical security measures to prevent unauthorized access to ports and peripherals. Monitoring system logs for unusual process crashes related to HID handling can help detect exploitation attempts early.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Japan, Australia, South Korea, Singapore, Netherlands
CVE-2025-46303: A malicious HID device may cause an unexpected process crash in Apple macOS
Description
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
AI-Powered Analysis
Technical Analysis
CVE-2025-46303 is a vulnerability identified in Apple macOS and related Apple operating systems (iOS and iPadOS) that involves improper bounds checking in the handling of Human Interface Devices (HIDs). HIDs include peripherals such as keyboards, mice, and other input devices. A maliciously crafted HID device can exploit this flaw to cause an unexpected process crash, effectively resulting in a denial-of-service (DoS) condition. The vulnerability is classified under CWE-119, which relates to improper restriction of operations within the bounds of a memory buffer, indicating a memory safety issue. The CVSS v3.1 base score is 5.7 (medium severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. This means an attacker must have physical or logical proximity to the target device to connect a malicious HID and require the user to interact with it to trigger the crash. The vulnerability was addressed by Apple through improved bounds checks in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. No public exploits or active exploitation have been reported to date. The flaw primarily affects Apple users who connect external HID devices, potentially disrupting normal operations by crashing processes handling these devices.
Potential Impact
The primary impact of CVE-2025-46303 is a denial-of-service condition caused by unexpected process crashes when a malicious HID device is connected. For organizations, this can lead to temporary loss of functionality of affected processes, potentially disrupting user productivity or critical operations relying on HID input. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, repeated or targeted exploitation could cause operational instability, especially in environments with high reliance on Apple devices and external peripherals. The requirement for user interaction and physical or logical proximity limits remote exploitation, reducing the risk of large-scale automated attacks. Nonetheless, organizations with shared workspaces, public access areas, or supply chain exposure to malicious peripherals should be cautious. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future attacks.
Mitigation Recommendations
Organizations should prioritize applying the security updates released by Apple for macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5 to remediate this vulnerability. Beyond patching, organizations should implement strict controls on the use of external HID devices, including restricting or monitoring USB and Bluetooth device connections to Apple systems. Employ endpoint security solutions capable of detecting anomalous device behavior or unauthorized peripheral connections. User education is critical to prevent interaction with unknown or suspicious devices. For high-security environments, consider disabling or limiting HID device usage where feasible or using device whitelisting to allow only trusted peripherals. Regularly audit connected devices and maintain an inventory of authorized hardware. Additionally, implement physical security measures to prevent unauthorized access to ports and peripherals. Monitoring system logs for unusual process crashes related to HID handling can help detect exploitation attempts early.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-22T21:13:49.960Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698d0dc44b57a58fa1d950a2
Added to database: 2/11/2026, 11:16:20 PM
Last enriched: 2/19/2026, 1:33:13 PM
Last updated: 2/21/2026, 12:19:27 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.