CVE-2019-7288

9.8 CRITICAL

📋 TL;DR

This vulnerability in Apple's FaceTime service allowed attackers to potentially access Live Photos data without proper authorization. It affected macOS and iOS users running vulnerable versions. The issue was server-side validation flaw that could expose sensitive user media.

💻 Affected Systems

Products:
  • FaceTime
Versions: Versions prior to macOS Mojave 10.14.3 Supplemental Update and iOS 12.1.4
Operating Systems: macOS, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default FaceTime configurations were vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized access to Live Photos data, potentially exposing private user media and metadata.

🟠

Likely Case

Limited exposure of Live Photos data to unauthorized parties during FaceTime calls.

🟢

If Mitigated

No impact if patched; proper server validation prevents unauthorized access.

🌐 Internet-Facing: HIGH - FaceTime is an internet-facing service that processes user media.
🏢 Internal Only: LOW - This is primarily an external service vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely required some level of access or interaction with the FaceTime service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Mojave 10.14.3 Supplemental Update, iOS 12.1.4

Vendor Advisory: https://support.apple.com/en-us/HT209520

Restart Required: Yes

Instructions:

1. Open System Preferences (macOS) or Settings (iOS). 2. Go to Software Update. 3. Install macOS 10.14.3 Supplemental Update or iOS 12.1.4. 4. Restart device after installation.

🔧 Temporary Workarounds

Disable FaceTime

all

Temporarily disable FaceTime service to prevent exploitation

macOS: sudo launchctl unload -w /System/Library/LaunchDaemons/com.apple.facetime.plist
iOS: Settings > FaceTime > Toggle off

🧯 If You Can't Patch

  • Disable FaceTime service completely
  • Implement network filtering to block FaceTime traffic at firewall

🔍 How to Verify

Check if Vulnerable:

Check macOS version: sw_vers -productVersion. Check iOS version: Settings > General > About > Version.

Check Version:

macOS: sw_vers -productVersion; iOS: Settings > General > About > Version

Verify Fix Applied:

Verify version is macOS 10.14.3 or later, or iOS 12.1.4 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FaceTime server access patterns
  • Failed validation attempts in FaceTime logs

Network Indicators:

  • Unusual traffic to/from FaceTime servers
  • Anomalous Live Photos data transfers

SIEM Query:

source="facetime" AND (event="validation_failure" OR event="unauthorized_access")

🔗 References

📤 Share & Export