CVE-2025-31271: Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen in Apple macOS
This issue was addressed through improved state management. This issue is fixed in macOS Tahoe 26. Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen.
AI Analysis
Technical Summary
CVE-2025-31271 is a vulnerability in Apple macOS that allows incoming FaceTime calls to be displayed or accepted on a device even when it is locked and notifications are disabled on the lock screen. The root cause is improper state management in the FaceTime call handling process, which fails to enforce lock screen restrictions effectively. This flaw enables an attacker to bypass the lock screen's intended protections, potentially accepting calls without the device owner's knowledge or consent. The vulnerability is exploitable remotely without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on the integrity of the device's access controls, as unauthorized call acceptance could lead to privacy breaches or unauthorized communication. The issue was addressed in macOS Tahoe 26 through improved state management mechanisms. Although no exploits have been observed in the wild, the vulnerability poses a significant risk due to the ease of exploitation and the sensitive nature of FaceTime communications. The vulnerability is classified under CWE-287, which relates to improper authentication or authorization mechanisms. Organizations relying on macOS devices should be aware of this vulnerability and apply patches promptly to mitigate risks.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to FaceTime calls on locked macOS devices, potentially exposing sensitive communications or enabling social engineering attacks. The ability to accept calls without user consent undermines device security and user privacy, which is critical for sectors handling confidential information such as finance, healthcare, and government. The flaw could be exploited to bypass physical device security controls, increasing the risk of espionage or data leakage. Since macOS devices are widely used in European corporate environments, especially in countries with high Apple market penetration, this vulnerability could affect a broad range of users. The absence of required privileges or user interaction for exploitation increases the threat level. Although no active exploitation is reported, the potential for misuse necessitates urgent remediation to maintain compliance with European data protection regulations like GDPR and to protect organizational assets.
Mitigation Recommendations
European organizations should immediately update all macOS devices to macOS Tahoe 26 or later, where the vulnerability is fixed. In addition to patching, organizations should audit and enforce strict device lock policies, ensuring that lock screens are configured to minimize exposure to incoming call notifications. Disable or restrict FaceTime usage on corporate devices where possible, especially in high-security environments. Implement mobile device management (MDM) solutions to centrally enforce update policies and monitor device compliance. Educate users about the risks of accepting calls on locked devices and encourage reporting of suspicious activity. Network-level controls could be used to restrict FaceTime traffic temporarily if patch deployment is delayed. Finally, review and enhance endpoint security monitoring to detect anomalous call acceptance or unusual FaceTime activity that could indicate exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Denmark, Finland, Norway, Ireland, Switzerland
CVE-2025-31271: Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen in Apple macOS
Description
This issue was addressed through improved state management. This issue is fixed in macOS Tahoe 26. Incoming FaceTime calls can appear or be accepted on a locked macOS device, even with notifications disabled on the lock screen.
AI-Powered Analysis
Technical Analysis
CVE-2025-31271 is a vulnerability in Apple macOS that allows incoming FaceTime calls to be displayed or accepted on a device even when it is locked and notifications are disabled on the lock screen. The root cause is improper state management in the FaceTime call handling process, which fails to enforce lock screen restrictions effectively. This flaw enables an attacker to bypass the lock screen's intended protections, potentially accepting calls without the device owner's knowledge or consent. The vulnerability is exploitable remotely without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on the integrity of the device's access controls, as unauthorized call acceptance could lead to privacy breaches or unauthorized communication. The issue was addressed in macOS Tahoe 26 through improved state management mechanisms. Although no exploits have been observed in the wild, the vulnerability poses a significant risk due to the ease of exploitation and the sensitive nature of FaceTime communications. The vulnerability is classified under CWE-287, which relates to improper authentication or authorization mechanisms. Organizations relying on macOS devices should be aware of this vulnerability and apply patches promptly to mitigate risks.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to FaceTime calls on locked macOS devices, potentially exposing sensitive communications or enabling social engineering attacks. The ability to accept calls without user consent undermines device security and user privacy, which is critical for sectors handling confidential information such as finance, healthcare, and government. The flaw could be exploited to bypass physical device security controls, increasing the risk of espionage or data leakage. Since macOS devices are widely used in European corporate environments, especially in countries with high Apple market penetration, this vulnerability could affect a broad range of users. The absence of required privileges or user interaction for exploitation increases the threat level. Although no active exploitation is reported, the potential for misuse necessitates urgent remediation to maintain compliance with European data protection regulations like GDPR and to protect organizational assets.
Mitigation Recommendations
European organizations should immediately update all macOS devices to macOS Tahoe 26 or later, where the vulnerability is fixed. In addition to patching, organizations should audit and enforce strict device lock policies, ensuring that lock screens are configured to minimize exposure to incoming call notifications. Disable or restrict FaceTime usage on corporate devices where possible, especially in high-security environments. Implement mobile device management (MDM) solutions to centrally enforce update policies and monitor device compliance. Educate users about the risks of accepting calls on locked devices and encourage reporting of suspicious activity. Network-level controls could be used to restrict FaceTime traffic temporarily if patch deployment is delayed. Finally, review and enhance endpoint security monitoring to detect anomalous call acceptance or unusual FaceTime activity that could indicate exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - apple
 - Date Reserved
 - 2025-03-27T16:13:58.343Z
 - Cvss Version
 - null
 - State
 - PUBLISHED
 
Threat ID: 68c8aa6cee2781683eebd568
Added to database: 9/16/2025, 12:08:12 AM
Last enriched: 11/3/2025, 7:09:54 PM
Last updated: 11/4/2025, 2:19:30 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43507: An app may be able to fingerprint the user in Apple visionOS
MediumCVE-2025-43505: Processing a maliciously crafted file may lead to heap corruption in Apple Xcode
HighCVE-2025-43504: A user in a privileged network position may be able to cause a denial-of-service in Apple Xcode
MediumCVE-2025-43503: Visiting a malicious website may lead to user interface spoofing in Apple Safari
HighCVE-2025-43502: An app may be able to bypass certain Privacy preferences in Apple Safari
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.