CVE-2025-30436: An attacker may be able to use Siri to enable Auto-Answer Calls in Apple iOS and iPadOS
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker may be able to use Siri to enable Auto-Answer Calls.
AI Analysis
Technical Summary
CVE-2025-30436 is a critical security vulnerability affecting Apple iOS and iPadOS devices prior to version 18.4. The flaw allows an unauthenticated attacker to leverage Siri voice assistant functionality on a locked device to enable the Auto-Answer Calls feature. Auto-Answer Calls automatically answers incoming calls, which can be exploited to eavesdrop on conversations or intercept sensitive communications without the device owner's knowledge or consent. The vulnerability arises because Siri, when invoked on a locked device, previously permitted enabling Auto-Answer Calls without requiring authentication or user interaction, violating access control principles (CWE-284). This issue was addressed by Apple in iOS/iPadOS 18.4 by restricting the options Siri can offer when the device is locked, effectively preventing unauthorized activation of Auto-Answer Calls. The vulnerability has a CVSS v3.1 base score of 9.1, indicating critical severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). Although no known exploits have been reported in the wild, the ease of exploitation and potential for covert surveillance make this a significant threat. The vulnerability affects all versions of iOS and iPadOS prior to 18.4, which are widely deployed globally on iPhones and iPads. The issue was reserved in March 2025 and published in May 2025, with Apple providing a fix in the 18.4 release cycle.
Potential Impact
The primary impact of CVE-2025-30436 is a severe breach of confidentiality and availability. By enabling Auto-Answer Calls remotely via Siri on a locked device, attackers can covertly listen to conversations, potentially capturing sensitive personal, corporate, or governmental information. This undermines user privacy and can facilitate espionage, corporate spying, or unauthorized surveillance. The availability impact arises because Auto-Answer Calls can disrupt normal device operation and user control over incoming calls. Organizations relying on Apple mobile devices for secure communications, including government agencies, enterprises, and individuals handling sensitive data, face heightened risk. The vulnerability's exploitation requires no privileges or user interaction, making it highly accessible to remote attackers within voice command range or via remote voice injection techniques. The widespread use of Apple devices globally increases the scope and scale of potential impact. Failure to patch promptly could result in data leaks, reputational damage, regulatory penalties, and loss of trust.
Mitigation Recommendations
To mitigate CVE-2025-30436, organizations and users should immediately update all affected Apple devices to iOS and iPadOS version 18.4 or later, where the vulnerability is fixed by restricting Siri options on locked devices. Until updates can be applied, it is advisable to disable Siri access from the lock screen via device settings to prevent unauthorized voice commands. Additionally, disabling the Auto-Answer Calls feature manually can reduce risk exposure. Organizations should enforce mobile device management (MDM) policies to ensure timely patch deployment and restrict Siri usage on corporate devices. Monitoring for unusual call activity and educating users about the risks of voice assistant features on locked devices can further reduce exploitation likelihood. Network-level protections such as voice command filtering or limiting physical access to devices can also help. Regular security audits and incident response readiness are recommended to detect and respond to potential exploitation attempts.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Japan, Australia, South Korea, Italy, Spain
CVE-2025-30436: An attacker may be able to use Siri to enable Auto-Answer Calls in Apple iOS and iPadOS
Description
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker may be able to use Siri to enable Auto-Answer Calls.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-30436 is a critical security vulnerability affecting Apple iOS and iPadOS devices prior to version 18.4. The flaw allows an unauthenticated attacker to leverage Siri voice assistant functionality on a locked device to enable the Auto-Answer Calls feature. Auto-Answer Calls automatically answers incoming calls, which can be exploited to eavesdrop on conversations or intercept sensitive communications without the device owner's knowledge or consent. The vulnerability arises because Siri, when invoked on a locked device, previously permitted enabling Auto-Answer Calls without requiring authentication or user interaction, violating access control principles (CWE-284). This issue was addressed by Apple in iOS/iPadOS 18.4 by restricting the options Siri can offer when the device is locked, effectively preventing unauthorized activation of Auto-Answer Calls. The vulnerability has a CVSS v3.1 base score of 9.1, indicating critical severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). Although no known exploits have been reported in the wild, the ease of exploitation and potential for covert surveillance make this a significant threat. The vulnerability affects all versions of iOS and iPadOS prior to 18.4, which are widely deployed globally on iPhones and iPads. The issue was reserved in March 2025 and published in May 2025, with Apple providing a fix in the 18.4 release cycle.
Potential Impact
The primary impact of CVE-2025-30436 is a severe breach of confidentiality and availability. By enabling Auto-Answer Calls remotely via Siri on a locked device, attackers can covertly listen to conversations, potentially capturing sensitive personal, corporate, or governmental information. This undermines user privacy and can facilitate espionage, corporate spying, or unauthorized surveillance. The availability impact arises because Auto-Answer Calls can disrupt normal device operation and user control over incoming calls. Organizations relying on Apple mobile devices for secure communications, including government agencies, enterprises, and individuals handling sensitive data, face heightened risk. The vulnerability's exploitation requires no privileges or user interaction, making it highly accessible to remote attackers within voice command range or via remote voice injection techniques. The widespread use of Apple devices globally increases the scope and scale of potential impact. Failure to patch promptly could result in data leaks, reputational damage, regulatory penalties, and loss of trust.
Mitigation Recommendations
To mitigate CVE-2025-30436, organizations and users should immediately update all affected Apple devices to iOS and iPadOS version 18.4 or later, where the vulnerability is fixed by restricting Siri options on locked devices. Until updates can be applied, it is advisable to disable Siri access from the lock screen via device settings to prevent unauthorized voice commands. Additionally, disabling the Auto-Answer Calls feature manually can reduce risk exposure. Organizations should enforce mobile device management (MDM) policies to ensure timely patch deployment and restrict Siri usage on corporate devices. Monitoring for unusual call activity and educating users about the risks of voice assistant features on locked devices can further reduce exploitation likelihood. Network-level protections such as voice command filtering or limiting physical access to devices can also help. Regular security audits and incident response readiness are recommended to detect and respond to potential exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2025-03-22T00:04:43.717Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec90a
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 4/3/2026, 1:06:57 AM
Last updated: 5/8/2026, 8:53:31 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.