Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31271: Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen in Apple macOS

0
High
VulnerabilityCVE-2025-31271cvecve-2025-31271
Published: Mon Sep 15 2025 (09/15/2025, 22:35:26 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed through improved state management. This issue is fixed in macOS Tahoe 26. Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen.

AI-Powered Analysis

AILast updated: 11/03/2025, 19:09:54 UTC

Technical Analysis

CVE-2025-31271 is a vulnerability in Apple macOS that allows incoming FaceTime calls to be displayed or accepted on a device even when it is locked and notifications are disabled on the lock screen. The root cause is improper state management in the FaceTime call handling process, which fails to enforce lock screen restrictions effectively. This flaw enables an attacker to bypass the lock screen's intended protections, potentially accepting calls without the device owner's knowledge or consent. The vulnerability is exploitable remotely without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on the integrity of the device's access controls, as unauthorized call acceptance could lead to privacy breaches or unauthorized communication. The issue was addressed in macOS Tahoe 26 through improved state management mechanisms. Although no exploits have been observed in the wild, the vulnerability poses a significant risk due to the ease of exploitation and the sensitive nature of FaceTime communications. The vulnerability is classified under CWE-287, which relates to improper authentication or authorization mechanisms. Organizations relying on macOS devices should be aware of this vulnerability and apply patches promptly to mitigate risks.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to FaceTime calls on locked macOS devices, potentially exposing sensitive communications or enabling social engineering attacks. The ability to accept calls without user consent undermines device security and user privacy, which is critical for sectors handling confidential information such as finance, healthcare, and government. The flaw could be exploited to bypass physical device security controls, increasing the risk of espionage or data leakage. Since macOS devices are widely used in European corporate environments, especially in countries with high Apple market penetration, this vulnerability could affect a broad range of users. The absence of required privileges or user interaction for exploitation increases the threat level. Although no active exploitation is reported, the potential for misuse necessitates urgent remediation to maintain compliance with European data protection regulations like GDPR and to protect organizational assets.

Mitigation Recommendations

European organizations should immediately update all macOS devices to macOS Tahoe 26 or later, where the vulnerability is fixed. In addition to patching, organizations should audit and enforce strict device lock policies, ensuring that lock screens are configured to minimize exposure to incoming call notifications. Disable or restrict FaceTime usage on corporate devices where possible, especially in high-security environments. Implement mobile device management (MDM) solutions to centrally enforce update policies and monitor device compliance. Educate users about the risks of accepting calls on locked devices and encourage reporting of suspicious activity. Network-level controls could be used to restrict FaceTime traffic temporarily if patch deployment is delayed. Finally, review and enhance endpoint security monitoring to detect anomalous call acceptance or unusual FaceTime activity that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-03-27T16:13:58.343Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c8aa6cee2781683eebd568

Added to database: 9/16/2025, 12:08:12 AM

Last enriched: 11/3/2025, 7:09:54 PM

Last updated: 11/4/2025, 2:19:30 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats