CVE-2025-46300
📋 TL;DR
This vulnerability allows a malicious HID (Human Interface Device) to cause unexpected process crashes on affected Apple systems. It affects macOS, iOS, and iPadOS users who connect untrusted USB or Bluetooth input devices. The issue stems from improper bounds checking that can be exploited via specially crafted HID devices.
💻 Affected Systems
- macOS
- iOS
- iPadOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
A malicious HID device could cause kernel panic or system crash, leading to denial of service and potential data loss from unsaved work.
Likely Case
Most probable impact is application or process crashes when using malicious USB/Bluetooth input devices, causing temporary disruption.
If Mitigated
With proper controls, impact is limited to isolated process crashes without system-wide effects or data compromise.
🎯 Exploit Status
Exploitation requires physical access or ability to connect malicious HID device. No authentication bypass needed once device is connected.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sequoia 15.7.4, iOS 18.7.5, iPadOS 18.7.5, macOS Sonoma 14.8.4
Vendor Advisory: https://support.apple.com/en-us/126347
Restart Required: Yes
Instructions:
1. Open System Settings > General > Software Update. 2. Install available updates. 3. Restart device when prompted.
🔧 Temporary Workarounds
Restrict Untrusted HID Devices
allImplement policies to prevent connection of untrusted USB/Bluetooth input devices
USB Port Control
macOSUse physical port locks or MDM policies to restrict USB device connections
🧯 If You Can't Patch
- Implement strict physical security controls to prevent unauthorized device connections
- Use endpoint protection software with USB device control capabilities
🔍 How to Verify
Check if Vulnerable:
Check system version against affected versions. On macOS: About This Mac > macOS Version. On iOS/iPadOS: Settings > General > About > Version.
Check Version:
macOS: sw_vers -productVersion, iOS/iPadOS: Not available via command line
Verify Fix Applied:
Verify system version matches or exceeds patched versions listed in fix_official.patch_version
📡 Detection & Monitoring
Log Indicators:
- Kernel panics related to IOHIDFamily
- Unexpected process crashes from input handling
- Console logs showing HID device connection errors
Network Indicators:
- Bluetooth pairing attempts from unknown devices
- USB device connection events in system logs
SIEM Query:
source="apple_system_logs" AND ("IOHIDFamily" OR "HID" OR "USB") AND ("panic" OR "crash" OR "error")