PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-4721 Apple CVE debrief

CVE-2016-4721 is a Medium-severity Apple vulnerability in the IDS - Connectivity component that could let a man-in-the-middle attacker spoof calls using a "switch caller" notification. According to NVD, the issue affects iOS before 10.1 and macOS before 10.12.1. Apple’s vendor advisories and the NVD record indicate this is an integrity-impacting flaw rather than a code-execution issue, but it can still undermine trust in caller identity and call-handling workflows.

Vendor
Apple
Product
CVE-2016-4721
CVSS
MEDIUM 5.9
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-20
Original CVE updated
2026-05-13
Advisory published
2017-02-20
Advisory updated
2026-05-13

Who should care

Anyone running affected Apple devices, especially organizations that rely on caller identity, call routing, or voice-based verification on iOS or macOS. Security teams should prioritize devices that remained on iOS versions before 10.1 or macOS versions before 10.12.1 at the time of exposure.

Technical summary

NVD describes the weakness as a network-reachable issue with high attack complexity and no privileges required, where a man-in-the-middle attacker could influence the IDS - Connectivity path enough to trigger or abuse a "switch caller" notification and spoof a call. The recorded CVSS vector is CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N, and NVD maps the weakness to CWE-254.

Defensive priority

Medium. The flaw is limited to integrity impact and requires a man-in-the-middle position, but it affects caller identity signaling on widely deployed Apple platforms and was patched in OS updates.

Recommended defensive actions

  • Upgrade iOS devices to version 10.1 or later.
  • Upgrade macOS systems to version 10.12.1 or later.
  • Verify fleet compliance for any devices that may still be on pre-patch Apple operating system versions.
  • Review business processes that rely on call identity indicators so they do not depend on unverified caller display alone.
  • Use Apple vendor advisories and the NVD record to confirm affected versions and remediation status.

Evidence notes

The description, affected versions, and CVSS vector are taken from the NVD record for CVE-2016-4721. The record lists iOS before 10.1 and macOS before 10.12.1 as vulnerable and cites Apple vendor advisories HT207271 and HT207275. A SecurityFocus BID reference is also present in the source corpus. No unsupported exploit steps or unverified technical details are included.

Official resources

Publicly disclosed on 2017-02-20 in the CVE/NVD record, with Apple vendor advisories referenced in the source corpus. The NVD record was later modified on 2026-05-13, which is a record update date and not the original issue date.