CVE-2025-46300

5.7 MEDIUM

📋 TL;DR

This vulnerability allows a malicious HID (Human Interface Device) to cause unexpected process crashes on affected Apple systems. It affects macOS, iOS, and iPadOS users who connect untrusted USB or Bluetooth input devices. The issue stems from improper bounds checking that can be exploited via specially crafted HID devices.

💻 Affected Systems

Products:
  • macOS
  • iOS
  • iPadOS
Versions: Versions prior to macOS Sequoia 15.7.4, iOS 18.7.5, iPadOS 18.7.5, and macOS Sonoma 14.8.4
Operating Systems: macOS, iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Requires connection of malicious HID device via USB or Bluetooth.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious HID device could cause kernel panic or system crash, leading to denial of service and potential data loss from unsaved work.

🟠

Likely Case

Most probable impact is application or process crashes when using malicious USB/Bluetooth input devices, causing temporary disruption.

🟢

If Mitigated

With proper controls, impact is limited to isolated process crashes without system-wide effects or data compromise.

🌐 Internet-Facing: LOW - This requires physical or local network access to connect malicious HID devices.
🏢 Internal Only: MEDIUM - Internal users with physical access could exploit this, but requires connecting malicious hardware.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access or ability to connect malicious HID device. No authentication bypass needed once device is connected.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.7.4, iOS 18.7.5, iPadOS 18.7.5, macOS Sonoma 14.8.4

Vendor Advisory: https://support.apple.com/en-us/126347

Restart Required: Yes

Instructions:

1. Open System Settings > General > Software Update. 2. Install available updates. 3. Restart device when prompted.

🔧 Temporary Workarounds

Restrict Untrusted HID Devices

all

Implement policies to prevent connection of untrusted USB/Bluetooth input devices

USB Port Control

macOS

Use physical port locks or MDM policies to restrict USB device connections

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized device connections
  • Use endpoint protection software with USB device control capabilities

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions. On macOS: About This Mac > macOS Version. On iOS/iPadOS: Settings > General > About > Version.

Check Version:

macOS: sw_vers -productVersion, iOS/iPadOS: Not available via command line

Verify Fix Applied:

Verify system version matches or exceeds patched versions listed in fix_official.patch_version

📡 Detection & Monitoring

Log Indicators:

  • Kernel panics related to IOHIDFamily
  • Unexpected process crashes from input handling
  • Console logs showing HID device connection errors

Network Indicators:

  • Bluetooth pairing attempts from unknown devices
  • USB device connection events in system logs

SIEM Query:

source="apple_system_logs" AND ("IOHIDFamily" OR "HID" OR "USB") AND ("panic" OR "crash" OR "error")

🔗 References

📤 Share & Export