Description
An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. An attacker may be able to spoof their FaceTime caller ID.
Published: 2025-12-12
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: FaceTime Caller ID Spoofing
Action: Patch Immediately
AI Analysis

Impact

The vulnerability arises from an inconsistent user interface that allowed improper state management, enabling an attacker to forge the Caller ID shown during FaceTime communications. This flaw falls under CWE-451. An attacker who can masquerade as a trusted user may trick recipients into disclosing sensitive information or performing actions under the false pretense of another user.

Affected Systems

All recent releases of Apple's multitouch platforms are affected. The issue is fixed starting with iOS 18.7.3 and 26.2, iPadOS 18.7.3 and 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, and watchOS 26.2. Devices running earlier versions remain vulnerable.

Risk and Exploitability

The CVSS score of 9.8 marks the vulnerability as critical, and the EPSS score of <1% suggests that exploitation attempts have been rare. The flaw has not yet been listed in CISA's KEV catalog. Because the attacker can masquerade as a legitimate participant in a FaceTime conversation using a forged Caller ID, the attack vector is most plausibly a remote impersonation that can affect any user receiving a call or message. No special privileges are required on the vulnerable device, so the flaw is exploitable remotely by simply initiating or receiving a FaceTime session.

Generated by OpenCVE AI on April 22, 2026 at 20:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all affected Apple devices to the fixed release: iOS 18.7.3 or 26.2, iPadOS 18.7.3 or 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, or watchOS 26.2.
  • After updating, reboot the device to ensure the new firmware is active and the state management fix is applied.
  • As a temporary measure, advise users not to trust calls or messages from unfamiliar numbers until the device has been updated, and consider disabling FaceTime for untrusted contacts.

Generated by OpenCVE AI on April 22, 2026 at 20:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Title FaceTime Caller ID Spoofing Vulnerability in Apple Platforms

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description An inconsistent user interface issue was addressed with improved state management. This issue is fixed in watchOS 26.2, macOS Sonoma 14.8.3, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, macOS Sequoia 15.7.3, visionOS 26.2. An attacker may be able to spoof their FaceTime caller ID. An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. An attacker may be able to spoof their FaceTime caller ID.

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. An attacker may be able to spoof their FaceTime caller ID. An inconsistent user interface issue was addressed with improved state management. This issue is fixed in watchOS 26.2, macOS Sonoma 14.8.3, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, macOS Sequoia 15.7.3, visionOS 26.2. An attacker may be able to spoof their FaceTime caller ID.
References

Wed, 17 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-451
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 16 Dec 2025 18:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. An attacker may be able to spoof their FaceTime caller ID.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:21:39.692Z

Reserved: 2025-04-22T21:13:49.959Z

Link: CVE-2025-46287

cve-icon Vulnrichment

Updated: 2025-12-16T15:23:37.907Z

cve-icon NVD

Status : Modified

Published: 2025-12-12T21:15:57.963

Modified: 2026-04-02T19:21:03.837

Link: CVE-2025-46287

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:45:27Z

Weaknesses