CVE-2025-46301

5.7 MEDIUM

📋 TL;DR

This vulnerability allows a malicious Human Interface Device (HID) like a keyboard or mouse to cause unexpected process crashes on affected Apple systems. It affects macOS and iOS/iPadOS users who connect untrusted HID devices. The issue stems from improper bounds checking that can be exploited through specially crafted HID input.

💻 Affected Systems

Products:
  • macOS
  • iOS
  • iPadOS
Versions: Versions prior to macOS Sequoia 15.7.4, iOS 18.7.5, iPadOS 18.7.5, and macOS Sonoma 14.8.4
Operating Systems: macOS, iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations with HID support are vulnerable. Requires connection of malicious HID device.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious HID device could cause critical system processes to crash, potentially leading to denial of service, data loss, or system instability requiring reboot.

🟠

Likely Case

Most probable impact is application or process crashes when using compromised or specially crafted HID devices, disrupting user workflow.

🟢

If Mitigated

With proper controls, impact is limited to isolated process crashes without privilege escalation or data compromise.

🌐 Internet-Facing: LOW - This requires physical or local USB connection, not remote network exploitation.
🏢 Internal Only: MEDIUM - Requires physical access or compromised internal HID devices, but could affect multiple users in shared environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access or compromised HID device. No authentication bypass needed once device is connected.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.7.4, iOS 18.7.5, iPadOS 18.7.5, macOS Sonoma 14.8.4

Vendor Advisory: https://support.apple.com/en-us/126347

Restart Required: No

Instructions:

1. Open System Settings > General > Software Update. 2. Install available updates. 3. For iOS/iPadOS: Settings > General > Software Update. 4. Apply the specified version updates.

🔧 Temporary Workarounds

Restrict Untrusted HID Devices

all

Prevent connection of unknown or untrusted USB HID devices through physical security or device management policies.

🧯 If You Can't Patch

  • Implement strict physical security controls for USB ports
  • Use device management software to restrict unauthorized HID device connections

🔍 How to Verify

Check if Vulnerable:

Check current OS version against affected versions. For macOS: System Settings > General > About. For iOS/iPadOS: Settings > General > About.

Check Version:

macOS: sw_vers -productVersion. iOS/iPadOS: Settings > General > About > Version.

Verify Fix Applied:

Verify OS version matches or exceeds patched versions: macOS Sequoia 15.7.4+, iOS 18.7.5+, iPadOS 18.7.5+, macOS Sonoma 14.8.4+.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes related to HID input
  • Kernel panic logs mentioning HID drivers
  • Console logs showing HID-related errors

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

source="system.log" AND ("HID" OR "Human Interface Device") AND ("crash" OR "panic" OR "error")

🔗 References

📤 Share & Export