CVE-2025-46304: A malicious HID device may cause an unexpected process crash in Apple macOS
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
AI Analysis
Technical Summary
CVE-2025-46304 is a vulnerability identified in Apple macOS and related operating systems, including iOS and iPadOS, where a malicious Human Interface Device (HID) can trigger an unexpected process crash. The root cause is insufficient bounds checking in the handling of input from HID devices, which can be exploited to cause a denial of service (DoS) by crashing affected processes. This vulnerability is tracked under CWE-400, indicating a resource exhaustion or DoS condition. The issue was addressed by Apple through improved bounds checking in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. The CVSS v3.1 base score is 5.7 (medium severity), with the vector AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating that the attack requires adjacent network access (e.g., via USB or Bluetooth), low attack complexity, no privileges, but requires user interaction, and impacts availability only. No known exploits have been reported in the wild, but the vulnerability could be leveraged by attackers supplying malicious HID devices to cause process crashes, potentially disrupting user workflows or critical applications. The vulnerability affects unspecified versions prior to the patched releases, implying a broad impact across multiple Apple OS versions. The technical fix involves enhanced input validation and bounds checking to prevent out-of-bounds memory access or resource exhaustion triggered by malformed HID input data.
Potential Impact
The primary impact of CVE-2025-46304 is denial of service through unexpected process crashes caused by malicious HID devices. For organizations, this can lead to disruption of critical applications or system components, potentially affecting productivity and operational continuity. While the vulnerability does not compromise confidentiality or integrity, repeated or targeted exploitation could degrade system reliability and availability, especially in environments relying heavily on macOS or Apple mobile devices. Attackers with physical or logical access to connect malicious HID devices (e.g., USB peripherals or Bluetooth devices) could exploit this vulnerability. This risk is particularly relevant in environments with shared or public workstations, or where supply chain attacks involving compromised peripherals are a concern. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. Organizations with high dependency on Apple ecosystems, including creative industries, software development, and government agencies, may experience operational impacts if unpatched systems are targeted.
Mitigation Recommendations
To mitigate CVE-2025-46304, organizations should prioritize applying the official Apple security updates: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5 or later. Beyond patching, organizations should implement strict controls on the use of external HID devices, including: 1) Enforcing device whitelisting policies to allow only trusted peripherals; 2) Using endpoint security solutions capable of monitoring and blocking unauthorized HID devices; 3) Educating users about the risks of connecting unknown USB or Bluetooth devices; 4) Employing physical security measures to prevent unauthorized access to USB ports; 5) Monitoring system logs for unusual process crashes or HID-related errors that could indicate exploitation attempts. Additionally, organizations should review supply chain security for peripherals and consider using hardware with built-in security features to detect malicious device behavior. Network segmentation and limiting user privileges can further reduce the attack surface. Regular vulnerability scanning and incident response preparedness will help detect and respond to any exploitation attempts promptly.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil, Netherlands, Sweden
CVE-2025-46304: A malicious HID device may cause an unexpected process crash in Apple macOS
Description
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
AI-Powered Analysis
Technical Analysis
CVE-2025-46304 is a vulnerability identified in Apple macOS and related operating systems, including iOS and iPadOS, where a malicious Human Interface Device (HID) can trigger an unexpected process crash. The root cause is insufficient bounds checking in the handling of input from HID devices, which can be exploited to cause a denial of service (DoS) by crashing affected processes. This vulnerability is tracked under CWE-400, indicating a resource exhaustion or DoS condition. The issue was addressed by Apple through improved bounds checking in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5. The CVSS v3.1 base score is 5.7 (medium severity), with the vector AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating that the attack requires adjacent network access (e.g., via USB or Bluetooth), low attack complexity, no privileges, but requires user interaction, and impacts availability only. No known exploits have been reported in the wild, but the vulnerability could be leveraged by attackers supplying malicious HID devices to cause process crashes, potentially disrupting user workflows or critical applications. The vulnerability affects unspecified versions prior to the patched releases, implying a broad impact across multiple Apple OS versions. The technical fix involves enhanced input validation and bounds checking to prevent out-of-bounds memory access or resource exhaustion triggered by malformed HID input data.
Potential Impact
The primary impact of CVE-2025-46304 is denial of service through unexpected process crashes caused by malicious HID devices. For organizations, this can lead to disruption of critical applications or system components, potentially affecting productivity and operational continuity. While the vulnerability does not compromise confidentiality or integrity, repeated or targeted exploitation could degrade system reliability and availability, especially in environments relying heavily on macOS or Apple mobile devices. Attackers with physical or logical access to connect malicious HID devices (e.g., USB peripherals or Bluetooth devices) could exploit this vulnerability. This risk is particularly relevant in environments with shared or public workstations, or where supply chain attacks involving compromised peripherals are a concern. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. Organizations with high dependency on Apple ecosystems, including creative industries, software development, and government agencies, may experience operational impacts if unpatched systems are targeted.
Mitigation Recommendations
To mitigate CVE-2025-46304, organizations should prioritize applying the official Apple security updates: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, and iPadOS 18.7.5 or later. Beyond patching, organizations should implement strict controls on the use of external HID devices, including: 1) Enforcing device whitelisting policies to allow only trusted peripherals; 2) Using endpoint security solutions capable of monitoring and blocking unauthorized HID devices; 3) Educating users about the risks of connecting unknown USB or Bluetooth devices; 4) Employing physical security measures to prevent unauthorized access to USB ports; 5) Monitoring system logs for unusual process crashes or HID-related errors that could indicate exploitation attempts. Additionally, organizations should review supply chain security for peripherals and consider using hardware with built-in security features to detect malicious device behavior. Network segmentation and limiting user privileges can further reduce the attack surface. Regular vulnerability scanning and incident response preparedness will help detect and respond to any exploitation attempts promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-22T21:13:49.960Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698d0dc44b57a58fa1d950a7
Added to database: 2/11/2026, 11:16:20 PM
Last enriched: 2/19/2026, 1:33:37 PM
Last updated: 2/21/2026, 12:19:04 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.