CVE-2025-46305
📋 TL;DR
A buffer overflow vulnerability in macOS and iOS/iPadOS allows malicious USB HID devices to cause unexpected process crashes. This affects users of macOS Sequoia, Sonoma, iOS 18, and iPadOS 18 before specific security updates. Physical access with a malicious USB device is required for exploitation.
💻 Affected Systems
- macOS
- iOS
- iPadOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
Potential arbitrary code execution leading to system compromise if combined with other vulnerabilities, though the CVE description only mentions process crashes.
Likely Case
Denial of service through process crashes when a malicious USB device is connected.
If Mitigated
No impact if systems are patched or physical USB access is controlled.
🎯 Exploit Status
Requires physical access with a specially crafted USB HID device. No authentication bypass needed once device is connected.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, iOS 18.7.5, iPadOS 18.7.5
Vendor Advisory: https://support.apple.com/en-us/126347
Restart Required: No
Instructions:
1. Open System Settings > General > Software Update. 2. Install available security updates. 3. For iOS/iPadOS: Settings > General > Software Update.
🔧 Temporary Workarounds
USB Device Restriction
allRestrict USB device usage through MDM policies or physical controls
🧯 If You Can't Patch
- Implement USB port controls or physical security to prevent unauthorized device connections
- Use endpoint protection that monitors for suspicious USB device behavior
🔍 How to Verify
Check if Vulnerable:
Check macOS version: System Settings > General > About. iOS/iPadOS: Settings > General > About.
Check Version:
macOS: sw_vers -productVersion, iOS/iPadOS: Not available via command line
Verify Fix Applied:
Verify version is macOS Sequoia 15.7.4+, Sonoma 14.8.4+, iOS/iPadOS 18.7.5+
📡 Detection & Monitoring
Log Indicators:
- Kernel panics, process crashes after USB device connection
- System logs showing unexpected USB device disconnections
Network Indicators:
- None - local physical attack only
SIEM Query:
source="system.log" AND ("panic" OR "crash") AND "USB"