VYPR
Unrated severityNVD Advisory· Published Oct 9, 2015· Updated May 6, 2026

CVE-2015-3785

CVE-2015-3785

Description

The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A local user can bypass telephone-call restrictions in OS X before 10.11 when Continuity is enabled, via unspecified vectors.

Vulnerability

The Telephony component in Apple OS X versions prior to 10.11 (El Capitan) contains an unspecified vulnerability that allows bypassing intended telephone-call restrictions. The issue is exploitable when the Continuity feature is enabled. Affected versions: OS X Yosemite and earlier (before 10.11). [1]

Exploitation

A local user with access to the system can exploit this vulnerability. The exact attack vector is not disclosed, but it requires the Continuity feature to be enabled. No authentication or special privileges beyond local access are mentioned. The attacker can bypass restrictions on telephone calls.

Impact

Successful exploitation allows a local user to bypass intended telephone-call restrictions, potentially enabling unauthorized calls. The impact is a violation of intended access controls on the Telephony component, leading to unauthorized use of telephony features.

Mitigation

Apple addressed this issue in OS X El Capitan v10.11, released on September 30, 2015. Users should update to OS X 10.11 or later. No workarounds are provided for earlier versions. [1]

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.