Impact
A flaw in macOS state management permits incoming FaceTime calls to appear or be accepted while the device is locked, even when lock‑screen notifications are disabled. The weakness enables an attacker to bypass normal authentication requirements for FaceTime access, classified as CWE‑287. The vulnerability does not provide remote code execution but can lead to unauthorized communication and potential privacy violations.
Affected Systems
Apple macOS systems prior to the release of macOS Tahoe 26 are affected. The issue is fixed in macOS Tahoe 26 and later versions; earlier releases remain vulnerable.
Risk and Exploitability
With a CVSS score of 7.5 the vulnerability is considered high severity. The EPSS score of less than 1% indicates a low exploitation probability at the moment, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a local or remote FaceTime client initiating a call to a device that is locked, bypassing the lock screen’s authentication checks.
OpenCVE Enrichment
EUVD