CVE-2025-46303

5.7 MEDIUM

📋 TL;DR

A buffer overflow vulnerability in macOS and iOS/iPadOS allows a malicious HID (Human Interface Device) to cause unexpected process crashes. This affects users of macOS Sequoia, Sonoma, iOS 18, and iPadOS 18 before specific patch versions. Attackers could exploit this by connecting a specially crafted USB or Bluetooth input device.

💻 Affected Systems

Products:
  • macOS
  • iOS
  • iPadOS
Versions: macOS Sequoia before 15.7.4, macOS Sonoma before 14.8.4, iOS and iPadOS before 18.7.5
Operating Systems: macOS, iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Requires connection of malicious HID device via USB or Bluetooth.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Potential arbitrary code execution leading to system compromise if combined with other vulnerabilities, though Apple's description suggests crash is primary outcome.

🟠

Likely Case

Denial of service through process crashes when malicious HID device is connected.

🟢

If Mitigated

No impact if patched or if untrusted HID devices are prevented from connecting.

🌐 Internet-Facing: LOW - Requires physical or local network access to connect malicious HID device.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised internal devices could exploit via USB/Bluetooth connections.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires physical access or ability to connect malicious HID device. No authentication needed once device is connected.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, iPadOS 18.7.5

Vendor Advisory: https://support.apple.com/en-us/126347

Restart Required: No

Instructions:

1. Open System Settings > General > Software Update. 2. Install available updates. 3. For iOS/iPadOS: Settings > General > Software Update.

🔧 Temporary Workarounds

Restrict HID Device Connections

all

Prevent connection of untrusted USB or Bluetooth HID devices through physical security or MDM policies.

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized device connections
  • Use MDM solutions to restrict Bluetooth and USB device connections

🔍 How to Verify

Check if Vulnerable:

Check current OS version against affected versions: macOS Sequoia <15.7.4, macOS Sonoma <14.8.4, iOS/iPadOS <18.7.5

Check Version:

macOS: sw_vers -productVersion; iOS/iPadOS: Settings > General > About > Version

Verify Fix Applied:

Confirm OS version matches or exceeds patched versions listed in fix_official.patch_version

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes in system logs
  • Console.app entries showing HID-related errors

Network Indicators:

  • Bluetooth connection attempts from unknown devices

SIEM Query:

source="system.log" AND ("crash" OR "terminated") AND process_name="WindowServer" OR "loginwindow"

🔗 References

📤 Share & Export