CVE-2025-31271: Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen in Apple macOS
This issue was addressed through improved state management. This issue is fixed in macOS Tahoe 26. Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen.
AI Analysis
Technical Summary
CVE-2025-31271 is a vulnerability identified in Apple macOS that allows incoming FaceTime calls to appear or be accepted on a locked device, even when notifications are disabled on the lock screen. This behavior indicates a flaw in the state management of FaceTime call handling on macOS devices. Normally, when a device is locked and notifications are disabled on the lock screen, incoming calls or notifications should not be visible or actionable to prevent unauthorized access or information leakage. However, due to this vulnerability, an attacker or an unsolicited caller could cause FaceTime calls to be displayed or accepted without the device owner’s interaction or consent, potentially bypassing lock screen protections. This could lead to unauthorized audio or video communication initiated from the locked device, exposing sensitive information or enabling surveillance. The issue was addressed by Apple through improved state management in macOS Tahoe 26, indicating that earlier versions remain vulnerable. The affected versions are unspecified, but it is implied that all versions prior to macOS Tahoe 26 are at risk. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability does not require user interaction to display or accept calls, and it bypasses lock screen notification settings, which increases its severity. However, exploitation requires the attacker to initiate a FaceTime call to the target device, which may limit the attack surface to devices with reachable FaceTime accounts.
Potential Impact
For European organizations, this vulnerability poses significant privacy and security risks, especially for employees using macOS devices in sensitive roles or handling confidential information. Unauthorized acceptance of FaceTime calls on locked devices could lead to eavesdropping, unauthorized recording, or leakage of sensitive conversations and data. This could compromise confidentiality and potentially integrity if attackers use the call channel to influence or manipulate users. The availability impact is limited but could disrupt normal device usage if exploited repeatedly. Organizations with remote or hybrid workforces relying on macOS devices are particularly vulnerable, as attackers could exploit this flaw to gain unauthorized access without physical device access. Additionally, sectors with strict data protection regulations, such as finance, healthcare, and government agencies in Europe, could face compliance risks and reputational damage if this vulnerability is exploited. The lack of user interaction requirement and bypass of lock screen notification settings make this vulnerability more dangerous in environments where devices are left unattended or locked but connected to networks. However, the absence of known exploits in the wild suggests that the threat is currently theoretical but should be addressed proactively.
Mitigation Recommendations
European organizations should prioritize updating all macOS devices to macOS Tahoe 26 or later, where the vulnerability is fixed. Until updates can be deployed, organizations should consider disabling FaceTime on managed devices, especially for users in sensitive roles or handling confidential data. Implementing strict access controls and network-level restrictions to limit incoming FaceTime calls from unknown or untrusted contacts can reduce exposure. Organizations should also educate users about the risk of accepting unexpected FaceTime calls and encourage vigilance when devices are locked. Monitoring network traffic for unusual FaceTime call patterns may help detect exploitation attempts. Additionally, enforcing full disk encryption and strong device passcodes can mitigate risks associated with physical device access. IT administrators should review and tighten lock screen and notification settings, although this vulnerability bypasses some of these controls, layered security remains important. Finally, organizations should maintain an inventory of macOS devices and ensure timely patch management processes to quickly address such vulnerabilities in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Switzerland
CVE-2025-31271: Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen in Apple macOS
Description
This issue was addressed through improved state management. This issue is fixed in macOS Tahoe 26. Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen.
AI-Powered Analysis
Technical Analysis
CVE-2025-31271 is a vulnerability identified in Apple macOS that allows incoming FaceTime calls to appear or be accepted on a locked device, even when notifications are disabled on the lock screen. This behavior indicates a flaw in the state management of FaceTime call handling on macOS devices. Normally, when a device is locked and notifications are disabled on the lock screen, incoming calls or notifications should not be visible or actionable to prevent unauthorized access or information leakage. However, due to this vulnerability, an attacker or an unsolicited caller could cause FaceTime calls to be displayed or accepted without the device owner’s interaction or consent, potentially bypassing lock screen protections. This could lead to unauthorized audio or video communication initiated from the locked device, exposing sensitive information or enabling surveillance. The issue was addressed by Apple through improved state management in macOS Tahoe 26, indicating that earlier versions remain vulnerable. The affected versions are unspecified, but it is implied that all versions prior to macOS Tahoe 26 are at risk. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability does not require user interaction to display or accept calls, and it bypasses lock screen notification settings, which increases its severity. However, exploitation requires the attacker to initiate a FaceTime call to the target device, which may limit the attack surface to devices with reachable FaceTime accounts.
Potential Impact
For European organizations, this vulnerability poses significant privacy and security risks, especially for employees using macOS devices in sensitive roles or handling confidential information. Unauthorized acceptance of FaceTime calls on locked devices could lead to eavesdropping, unauthorized recording, or leakage of sensitive conversations and data. This could compromise confidentiality and potentially integrity if attackers use the call channel to influence or manipulate users. The availability impact is limited but could disrupt normal device usage if exploited repeatedly. Organizations with remote or hybrid workforces relying on macOS devices are particularly vulnerable, as attackers could exploit this flaw to gain unauthorized access without physical device access. Additionally, sectors with strict data protection regulations, such as finance, healthcare, and government agencies in Europe, could face compliance risks and reputational damage if this vulnerability is exploited. The lack of user interaction requirement and bypass of lock screen notification settings make this vulnerability more dangerous in environments where devices are left unattended or locked but connected to networks. However, the absence of known exploits in the wild suggests that the threat is currently theoretical but should be addressed proactively.
Mitigation Recommendations
European organizations should prioritize updating all macOS devices to macOS Tahoe 26 or later, where the vulnerability is fixed. Until updates can be deployed, organizations should consider disabling FaceTime on managed devices, especially for users in sensitive roles or handling confidential data. Implementing strict access controls and network-level restrictions to limit incoming FaceTime calls from unknown or untrusted contacts can reduce exposure. Organizations should also educate users about the risk of accepting unexpected FaceTime calls and encourage vigilance when devices are locked. Monitoring network traffic for unusual FaceTime call patterns may help detect exploitation attempts. Additionally, enforcing full disk encryption and strong device passcodes can mitigate risks associated with physical device access. IT administrators should review and tighten lock screen and notification settings, although this vulnerability bypasses some of these controls, layered security remains important. Finally, organizations should maintain an inventory of macOS devices and ensure timely patch management processes to quickly address such vulnerabilities in the future.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2025-03-27T16:13:58.343Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c8aa6cee2781683eebd568
Added to database: 9/16/2025, 12:08:12 AM
Last enriched: 9/16/2025, 12:11:10 AM
Last updated: 9/19/2025, 3:30:01 PM
Views: 1
Related Threats
CVE-2025-36248: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Copy Services Manager
MediumCVE-2025-57296: n/a
CriticalCVE-2025-56869: n/a
HighCVE-2025-10718: Improper Export of Android Application Components in Ooma Office Business Phone App
MediumCVE-2025-55910: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.