Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46303: A malicious HID device may cause an unexpected process crash in Apple macOS

0
Medium
VulnerabilityCVE-2025-46303cvecve-2025-46303
Published: Wed Feb 11 2026 (02/11/2026, 22:58:28 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.

AI-Powered Analysis

AILast updated: 02/19/2026, 13:33:13 UTC

Technical Analysis

CVE-2025-46303 is a vulnerability identified in Apple macOS and related Apple operating systems (iOS and iPadOS) that involves improper bounds checking in the handling of Human Interface Devices (HIDs). HIDs include peripherals such as keyboards, mice, and other input devices. A maliciously crafted HID device can exploit this flaw to cause an unexpected process crash, effectively resulting in a denial-of-service (DoS) condition. The vulnerability is classified under CWE-119, which relates to improper restriction of operations within the bounds of a memory buffer, indicating a memory safety issue. The CVSS v3.1 base score is 5.7 (medium severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. This means an attacker must have physical or logical proximity to the target device to connect a malicious HID and require the user to interact with it to trigger the crash. The vulnerability was addressed by Apple through improved bounds checks in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. No public exploits or active exploitation have been reported to date. The flaw primarily affects Apple users who connect external HID devices, potentially disrupting normal operations by crashing processes handling these devices.

Potential Impact

The primary impact of CVE-2025-46303 is a denial-of-service condition caused by unexpected process crashes when a malicious HID device is connected. For organizations, this can lead to temporary loss of functionality of affected processes, potentially disrupting user productivity or critical operations relying on HID input. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, repeated or targeted exploitation could cause operational instability, especially in environments with high reliance on Apple devices and external peripherals. The requirement for user interaction and physical or logical proximity limits remote exploitation, reducing the risk of large-scale automated attacks. Nonetheless, organizations with shared workspaces, public access areas, or supply chain exposure to malicious peripherals should be cautious. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future attacks.

Mitigation Recommendations

Organizations should prioritize applying the security updates released by Apple for macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5 to remediate this vulnerability. Beyond patching, organizations should implement strict controls on the use of external HID devices, including restricting or monitoring USB and Bluetooth device connections to Apple systems. Employ endpoint security solutions capable of detecting anomalous device behavior or unauthorized peripheral connections. User education is critical to prevent interaction with unknown or suspicious devices. For high-security environments, consider disabling or limiting HID device usage where feasible or using device whitelisting to allow only trusted peripherals. Regularly audit connected devices and maintain an inventory of authorized hardware. Additionally, implement physical security measures to prevent unauthorized access to ports and peripherals. Monitoring system logs for unusual process crashes related to HID handling can help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.960Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dc44b57a58fa1d950a2

Added to database: 2/11/2026, 11:16:20 PM

Last enriched: 2/19/2026, 1:33:13 PM

Last updated: 2/21/2026, 12:19:27 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats