Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46287: An attacker may be able to spoof their FaceTime caller ID in Apple iOS and iPadOS

0
Critical
VulnerabilityCVE-2025-46287cvecve-2025-46287
Published: Fri Dec 12 2025 (12/12/2025, 20:56:48 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

An inconsistent user interface issue was addressed with improved state management. This issue is fixed in watchOS 26.2, macOS Sonoma 14.8.3, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, macOS Sequoia 15.7.3, visionOS 26.2. An attacker may be able to spoof their FaceTime caller ID.

AI-Powered Analysis

AILast updated: 12/19/2025, 22:36:21 UTC

Technical Analysis

CVE-2025-46287 is a critical security vulnerability identified in Apple’s FaceTime service across iOS, iPadOS, watchOS, macOS, and visionOS platforms. The root cause is an inconsistent user interface state management issue (classified under CWE-451), which allows an attacker to spoof the caller ID displayed during FaceTime calls. This means an attacker can impersonate another user’s identity, potentially a trusted contact, without needing any privileges or user interaction, making the attack remotely exploitable over the network. The vulnerability compromises confidentiality by misleading users about the caller’s identity, integrity by falsifying communication metadata, and availability by potentially enabling denial or disruption of legitimate communications. Apple addressed this issue by improving state management in the user interface, releasing patches in watchOS 26.2, macOS Sonoma 14.8.3, iOS 18.7.3, iPadOS 18.7.3, and other related OS versions. Despite no known exploits in the wild, the vulnerability’s CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates it is easy to exploit remotely without authentication or user interaction, with a full impact on confidentiality, integrity, and availability. The vulnerability affects unspecified versions of Apple’s operating systems prior to the patched releases, necessitating urgent updates. This flaw can be leveraged in social engineering, phishing, or targeted attacks to deceive users and gain unauthorized access or disrupt communications.

Potential Impact

For European organizations, the impact of CVE-2025-46287 is significant due to the widespread use of Apple devices in both consumer and enterprise environments. Spoofing FaceTime caller IDs can facilitate sophisticated social engineering attacks, enabling attackers to impersonate trusted contacts or executives to extract sensitive information or deploy malware. Confidential communications may be intercepted or manipulated, undermining trust in internal and external communications. The integrity of communication channels is compromised, potentially leading to fraudulent transactions or unauthorized access to corporate resources. Availability may also be affected if attackers disrupt or flood FaceTime services. Sectors such as finance, government, healthcare, and critical infrastructure in Europe are particularly vulnerable due to their reliance on secure communications and the high value of their data. The lack of required user interaction or privileges lowers the barrier for exploitation, increasing the risk of widespread attacks if patches are not applied promptly.

Mitigation Recommendations

European organizations should immediately deploy the latest security updates from Apple for all affected operating systems, including iOS 18.7.3, iPadOS 18.7.3, watchOS 26.2, macOS Sonoma 14.8.3, and others as applicable. Beyond patching, organizations should implement strict verification protocols for FaceTime communications, such as secondary confirmation via alternative channels for sensitive or unexpected calls. Security awareness training should emphasize the risk of caller ID spoofing and encourage users to verify identities before sharing sensitive information. Network-level monitoring for anomalous FaceTime traffic patterns can help detect potential exploitation attempts. Enterprises should consider restricting FaceTime usage on corporate devices or enforcing policies that limit FaceTime to trusted contacts only. Additionally, integrating endpoint detection and response (EDR) solutions capable of identifying suspicious activity related to communication spoofing can enhance defense. Regular audits of device OS versions and compliance with update policies are critical to maintaining security posture.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-04-22T21:13:49.959Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c8581f55ccbd2c799d98d

Added to database: 12/12/2025, 9:13:37 PM

Last enriched: 12/19/2025, 10:36:21 PM

Last updated: 2/7/2026, 6:34:35 PM

Views: 358

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats