CVE-2025-46287: An attacker may be able to spoof their FaceTime caller ID in Apple macOS
An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. An attacker may be able to spoof their FaceTime caller ID.
AI Analysis
Technical Summary
CVE-2025-46287 is a security vulnerability identified in Apple macOS related to FaceTime, Apple's video and audio calling service. The root cause is an inconsistent user interface state management issue that allows an attacker to spoof the FaceTime caller ID. This means an attacker can manipulate the caller ID information displayed to the recipient, making it appear as though the call is coming from a trusted or different source. The vulnerability affects macOS versions prior to the patched releases macOS Sonoma 14.8.3 and macOS Sequoia 15.7.3, though the exact affected versions are unspecified. The flaw was addressed by Apple through improved state management to ensure the caller ID is accurately represented. Exploitation does not require authentication or complex user interaction beyond receiving the call, making it relatively straightforward for an attacker to attempt. While no known exploits are currently reported in the wild, the potential for misuse in social engineering or phishing attacks is significant, as users may be deceived into trusting malicious callers. This vulnerability primarily impacts the confidentiality and integrity of communications by undermining trust in caller identity, potentially leading to unauthorized information disclosure or fraudulent activities. The lack of a CVSS score necessitates an expert severity assessment based on the nature of the vulnerability and its potential consequences.
Potential Impact
For European organizations, this vulnerability poses a risk of social engineering and phishing attacks leveraging caller ID spoofing on FaceTime. Attackers could impersonate trusted contacts, executives, or service providers to extract sensitive information, gain unauthorized access, or conduct fraud. This undermines communication trust and could lead to data breaches, financial loss, or reputational damage. Organizations relying on macOS devices for internal or external communications, especially in sectors like finance, government, and critical infrastructure, are particularly vulnerable. The ease of exploitation without authentication increases the threat surface. Additionally, the potential for targeted attacks against high-profile individuals or departments within European entities could have strategic consequences. The absence of known exploits currently provides a window for proactive mitigation before widespread abuse occurs.
Mitigation Recommendations
European organizations should immediately deploy the security updates macOS Sonoma 14.8.3 and macOS Sequoia 15.7.3 to all affected devices to remediate the vulnerability. IT teams must verify patch deployment through endpoint management tools and ensure no devices remain on vulnerable versions. User education campaigns should emphasize verifying caller identity through secondary channels and exercising caution with unexpected FaceTime calls, especially those requesting sensitive information. Implementing network-level controls to monitor and restrict FaceTime traffic where feasible can reduce exposure. Organizations should also review and enhance incident response plans to address potential social engineering attacks stemming from caller ID spoofing. Regular audits of communication security policies and integration of caller verification technologies can further mitigate risks. Finally, monitoring threat intelligence feeds for emerging exploits related to this vulnerability is recommended to maintain situational awareness.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Norway, Denmark, Finland, Ireland, Switzerland
CVE-2025-46287: An attacker may be able to spoof their FaceTime caller ID in Apple macOS
Description
An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. An attacker may be able to spoof their FaceTime caller ID.
AI-Powered Analysis
Technical Analysis
CVE-2025-46287 is a security vulnerability identified in Apple macOS related to FaceTime, Apple's video and audio calling service. The root cause is an inconsistent user interface state management issue that allows an attacker to spoof the FaceTime caller ID. This means an attacker can manipulate the caller ID information displayed to the recipient, making it appear as though the call is coming from a trusted or different source. The vulnerability affects macOS versions prior to the patched releases macOS Sonoma 14.8.3 and macOS Sequoia 15.7.3, though the exact affected versions are unspecified. The flaw was addressed by Apple through improved state management to ensure the caller ID is accurately represented. Exploitation does not require authentication or complex user interaction beyond receiving the call, making it relatively straightforward for an attacker to attempt. While no known exploits are currently reported in the wild, the potential for misuse in social engineering or phishing attacks is significant, as users may be deceived into trusting malicious callers. This vulnerability primarily impacts the confidentiality and integrity of communications by undermining trust in caller identity, potentially leading to unauthorized information disclosure or fraudulent activities. The lack of a CVSS score necessitates an expert severity assessment based on the nature of the vulnerability and its potential consequences.
Potential Impact
For European organizations, this vulnerability poses a risk of social engineering and phishing attacks leveraging caller ID spoofing on FaceTime. Attackers could impersonate trusted contacts, executives, or service providers to extract sensitive information, gain unauthorized access, or conduct fraud. This undermines communication trust and could lead to data breaches, financial loss, or reputational damage. Organizations relying on macOS devices for internal or external communications, especially in sectors like finance, government, and critical infrastructure, are particularly vulnerable. The ease of exploitation without authentication increases the threat surface. Additionally, the potential for targeted attacks against high-profile individuals or departments within European entities could have strategic consequences. The absence of known exploits currently provides a window for proactive mitigation before widespread abuse occurs.
Mitigation Recommendations
European organizations should immediately deploy the security updates macOS Sonoma 14.8.3 and macOS Sequoia 15.7.3 to all affected devices to remediate the vulnerability. IT teams must verify patch deployment through endpoint management tools and ensure no devices remain on vulnerable versions. User education campaigns should emphasize verifying caller identity through secondary channels and exercising caution with unexpected FaceTime calls, especially those requesting sensitive information. Implementing network-level controls to monitor and restrict FaceTime traffic where feasible can reduce exposure. Organizations should also review and enhance incident response plans to address potential social engineering attacks stemming from caller ID spoofing. Regular audits of communication security policies and integration of caller verification technologies can further mitigate risks. Finally, monitoring threat intelligence feeds for emerging exploits related to this vulnerability is recommended to maintain situational awareness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-22T21:13:49.959Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693c8581f55ccbd2c799d98d
Added to database: 12/12/2025, 9:13:37 PM
Last enriched: 12/12/2025, 9:28:49 PM
Last updated: 12/13/2025, 9:54:56 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14587: SQL Injection in itsourcecode Online Pet Shop Management System
MediumCVE-2025-9856: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in popupbuilder Popup Builder – Create highly converting, mobile friendly marketing popups.
MediumCVE-2025-8780: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in livemesh Livemesh SiteOrigin Widgets
MediumCVE-2025-8687: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themelooks Enter Addons – Ultimate Template Builder for Elementor
MediumCVE-2025-8199: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in debuggersstudio Marquee Addons for Elementor – Advanced Elements & Modern Motion Widgets
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.