A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active Apple devices and tens of millions of third-party gadgets to remote code execution (RCE) attacks requiring no user interaction.
Researchers at Oligo Security discovered that the flaw allows attackers on the same Wi-Fi network to hijack devices ranging from Macs and iPhones to CarPlay-enabled vehicles and smart speakers.
The Airborne vulnerabilities stem from flaws in Apple’s AirPlay protocol and its Software Development Kit (SDK), which third-party manufacturers use to integrate AirPlay compatibility. Oligo identified 23 vulnerabilities, 17 of which received CVE designations, including:
These vulnerabilities exploit AirPlay’s handling of property lists (plists), structured data formats used to serialize commands. Improper validation of plist parameters, such as assuming all inputs are dictionaries, led to type confusion, memory corruption, and arbitrary code execution.
For example, sending malformed plists via the /setProperty
command crashes the ControlCenter process, while flooding RTSP SETUP
requests can overload the WindowServer service, forcibly logging users out.
Attackers can leverage Airborne in multiple scenarios:
Macs and iOS devices with AirPlay receiver enabled (default: “Current User”) are vulnerable to zero-click attacks if paired with CVE-2025-24206. Oligo demonstrated exploiting this to overwrite memory in Apple’s Music app, potentially spreading malware across networks.
Third-party speakers and CarPlay units using the vulnerable SDK are equally at risk. Researchers hijacked a Bose speaker to display custom logos and audio.
The buffer overflow (CVE-2025-24132) permits self-propagating attacks. A compromised device on a corporate network could infect others without user interaction, enabling lateral movement for espionage or ransomware. Public Wi-Fi hotspots, like those in airports, are prime targets for mass exploitation.
Over 800 car models with wireless CarPlay are vulnerable to proximity-based attacks. If a vehicle’s Wi-Fi hotspot uses a weak password, attackers within range can execute RCE to manipulate infotainment systems-playing disruptive audio, tracking locations, or eavesdropping via built-in microphones. Bluetooth-based pairing (requiring PIN entry) and USB connections also pose risks.
Apple released patches in macOS Sequoia 15.4, iOS 18.4, and AirPlay SDK 2.7.1/3.6.0.126 to address these issues. However, Oligo warns that many third-party devices may remain unpatched indefinitely due to fragmented update mechanisms.
Gal Elbaz, Oligo’s co-founder, emphasized, “AirPlay’s integration into diverse ecosystems means some devices will linger vulnerable for years”.
To minimize exposure:
The AirBorne flaws underscore systemic risks in widely adopted protocols. As Apple’s ecosystem expands- 2.35 billion active devices as of January 2025- and third-party integrations proliferate, coordinated disclosure and rapid patching are critical.
Yet, the longevity of unpatched devices in consumer and industrial settings remains a persistent challenge, highlighting the need for proactive security frameworks in IoT development.
Apple has not reported active exploitation but has confirmed the severity of the vulnerabilities, urging immediate updates. For enterprises, Oligo recommends segmenting networks to isolate AirPlay-enabled devices and auditing connected endpoints for signs of compromise.
Are you from the SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
A sophisticated malware campaign utilizing multiple layers of AutoIT code has been discovered targeting Windows…
A newly identified phishing campaign deploys the Remcos Remote Access Trojan (RAT) using DBatLoader, leveraging…
Cyber attacks continue to plague organizations worldwide, with a staggering 67% of businesses reporting they…
Ivanti has disclosed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) solution. When chained…
Eric Council Jr., a 26-year-old man from Huntsville, Alabama, was sentenced on May 16, 2025,…
Web Application Firewalls (WAFs) have been a critical defense mechanism protecting web applications from malicious…