CVE-2025-46305

5.7 MEDIUM

📋 TL;DR

A buffer overflow vulnerability in macOS and iOS/iPadOS allows malicious USB HID devices to cause unexpected process crashes. This affects users of macOS Sequoia, Sonoma, iOS 18, and iPadOS 18 before specific security updates. Physical access with a malicious USB device is required for exploitation.

💻 Affected Systems

Products:
  • macOS
  • iOS
  • iPadOS
Versions: macOS Sequoia before 15.7.4, macOS Sonoma before 14.8.4, iOS/iPadOS before 18.7.5
Operating Systems: macOS, iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Requires physical USB HID device connection.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Potential arbitrary code execution leading to system compromise if combined with other vulnerabilities, though the CVE description only mentions process crashes.

🟠

Likely Case

Denial of service through process crashes when a malicious USB device is connected.

🟢

If Mitigated

No impact if systems are patched or physical USB access is controlled.

🌐 Internet-Facing: LOW - Requires physical USB device connection, not network exploitable.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised USB devices in physical reach could cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires physical access with a specially crafted USB HID device. No authentication bypass needed once device is connected.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, iPadOS 18.7.5

Vendor Advisory: https://support.apple.com/en-us/126347

Restart Required: No

Instructions:

1. Open System Settings > General > Software Update. 2. Install available security updates. 3. For iOS/iPadOS: Settings > General > Software Update.

🔧 Temporary Workarounds

USB Device Restriction

all

Restrict USB device usage through MDM policies or physical controls

🧯 If You Can't Patch

  • Implement USB port controls or physical security to prevent unauthorized device connections
  • Use endpoint protection that monitors for suspicious USB device behavior

🔍 How to Verify

Check if Vulnerable:

Check macOS version: System Settings > General > About. iOS/iPadOS: Settings > General > About.

Check Version:

macOS: sw_vers -productVersion, iOS/iPadOS: Not available via command line

Verify Fix Applied:

Verify version is macOS Sequoia 15.7.4+, Sonoma 14.8.4+, iOS/iPadOS 18.7.5+

📡 Detection & Monitoring

Log Indicators:

  • Kernel panics, process crashes after USB device connection
  • System logs showing unexpected USB device disconnections

Network Indicators:

  • None - local physical attack only

SIEM Query:

source="system.log" AND ("panic" OR "crash") AND "USB"

🔗 References

📤 Share & Export