CVE-2025-46287
BaseFortify
Publication date: 2025-12-12
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | macos | From 14.0 (inc) to 14.8.3 (exc) |
| apple | macos | From 15.0 (inc) to 15.7.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-451 | The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an inconsistent user interface issue related to FaceTime on macOS. It involves improper state management that could allow an attacker to spoof their FaceTime caller ID, making it appear as someone else is calling.
How can this vulnerability impact me? :
The vulnerability could allow an attacker to impersonate another user by spoofing their FaceTime caller ID, potentially leading to social engineering attacks or unauthorized access based on caller identity trust.
What immediate steps should I take to mitigate this vulnerability?
Update your macOS system to the fixed versions macOS Sonoma 14.8.3 or macOS Sequoia 15.7.3 to address the vulnerability that allows FaceTime caller ID spoofing.