CVE-2025-46306
📋 TL;DR
This vulnerability allows attackers to read sensitive memory contents by tricking users into opening malicious Keynote files. It affects macOS, iOS, iPadOS, and Keynote users who process untrusted presentation files. The memory disclosure could expose passwords, encryption keys, or other sensitive data.
💻 Affected Systems
- macOS
- iOS
- iPadOS
- Keynote
📦 What is this software?
Ipados by Apple
Keynote by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
Complete memory dump revealing passwords, encryption keys, session tokens, and other sensitive application data leading to full system compromise.
Likely Case
Limited memory disclosure revealing some application data or user information, potentially enabling further attacks.
If Mitigated
No impact if systems are patched or if users never open untrusted Keynote files.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file). No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Tahoe 26, iOS 26, iPadOS 26, Keynote 15.1
Vendor Advisory: https://support.apple.com/en-us/125108
Restart Required: Yes
Instructions:
1. Open System Settings > General > Software Update. 2. Install available updates for macOS/iOS/iPadOS. 3. For Keynote, update via App Store > Updates. 4. Restart device after installation.
🔧 Temporary Workarounds
Disable automatic file opening
allPrevent Keynote from automatically opening files to reduce attack surface
Sandbox Keynote execution
macOSRun Keynote in restricted environments to limit memory access
🧯 If You Can't Patch
- Block Keynote files from untrusted sources at network perimeter
- Educate users to never open Keynote files from unknown senders
🔍 How to Verify
Check if Vulnerable:
Check macOS version: About This Mac > macOS version. Check iOS/iPadOS: Settings > General > About > Version. Check Keynote: Open Keynote > Keynote menu > About Keynote.
Check Version:
macOS: sw_vers -productVersion, iOS/iPadOS: Settings > General > About
Verify Fix Applied:
Verify version numbers match or exceed: macOS Tahoe 26, iOS 26, iPadOS 26, Keynote 15.1
📡 Detection & Monitoring
Log Indicators:
- Keynote crash logs with memory access violations
- Unexpected Keynote file processing from untrusted sources
Network Indicators:
- Inbound Keynote files from suspicious sources
- Outbound data exfiltration after Keynote file processing
SIEM Query:
source="*keynote*" AND (event="crash" OR event="memory_access")