Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46306: Processing a maliciously crafted Keynote file may disclose memory contents in Apple iOS and iPadOS

0
Unknown
VulnerabilityCVE-2025-46306cvecve-2025-46306
Published: Wed Jan 28 2026 (01/28/2026, 17:26:19 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with improved bounds checks. This issue is fixed in macOS Tahoe 26, Keynote 15.1, iOS 26 and iPadOS 26. Processing a maliciously crafted Keynote file may disclose memory contents.

AI-Powered Analysis

AILast updated: 01/28/2026, 18:06:12 UTC

Technical Analysis

CVE-2025-46306 is a memory disclosure vulnerability affecting Apple iOS and iPadOS platforms through the processing of maliciously crafted Keynote presentation files. The root cause is inadequate bounds checking during the parsing of Keynote files, which can lead to reading and disclosing unintended memory contents. This vulnerability could allow an attacker to craft a specially designed Keynote file that, when opened on a vulnerable device, leaks portions of the device's memory. Such leaked memory may contain sensitive information including credentials, cryptographic keys, or other private data residing in memory at the time of exploitation. Apple has addressed this vulnerability by enhancing bounds checking in the affected components, releasing patches in iOS 26, iPadOS 26, macOS Tahoe 26, and Keynote 15.1. No public exploits or active exploitation campaigns have been reported as of the publication date. The vulnerability requires the victim to open a malicious Keynote file, implying user interaction is necessary. There is no indication that authentication is required to trigger the vulnerability, making it feasible for attackers to distribute malicious files via email, messaging, or file sharing platforms. The vulnerability affects all prior versions of iOS and iPadOS that support Keynote file processing and have not been updated to the fixed versions. Given the widespread use of Apple devices in enterprise and government sectors, this vulnerability poses a risk of sensitive data leakage if exploited.

Potential Impact

For European organizations, the primary impact of CVE-2025-46306 is the potential compromise of confidentiality due to memory disclosure. Sensitive corporate or governmental information stored in device memory could be exposed if a user opens a malicious Keynote file. This could lead to data breaches, intellectual property theft, or exposure of credentials that facilitate further attacks. The vulnerability does not directly affect system integrity or availability but could serve as a stepping stone for more advanced attacks if sensitive information is leaked. Sectors such as finance, government, healthcare, and critical infrastructure in Europe that rely on Apple mobile devices for document handling and communication are particularly at risk. The requirement for user interaction limits mass exploitation but targeted spear-phishing campaigns could be effective. The absence of known exploits in the wild reduces immediate risk but organizations should act proactively to prevent potential future exploitation. Failure to patch could result in regulatory compliance issues under GDPR if personal data is exposed.

Mitigation Recommendations

European organizations should prioritize updating all Apple devices to iOS 26, iPadOS 26, macOS Tahoe 26, and Keynote 15.1 or later to ensure the vulnerability is patched. Implement strict controls on the sources of Keynote files, including disabling automatic opening of attachments and educating users about the risks of opening files from unknown or untrusted sources. Employ advanced email filtering and sandboxing solutions to detect and block malicious attachments. Use Mobile Device Management (MDM) solutions to enforce timely updates and restrict installation of unapproved applications or files. Conduct regular security awareness training focused on spear-phishing and social engineering tactics. Monitor network traffic for unusual activity that could indicate exploitation attempts. Where possible, restrict the use of Keynote files in sensitive environments or replace with more secure document formats. Maintain incident response plans to quickly address any suspected exploitation. Finally, ensure backups and data protection mechanisms are in place to mitigate any secondary impacts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.960Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a4c814623b1157cded9c9

Added to database: 1/28/2026, 5:50:57 PM

Last enriched: 1/28/2026, 6:06:12 PM

Last updated: 1/28/2026, 7:22:45 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats