Millions of AirPlay devices can be hacked over Wi-Fi; CarPlay too
- Cybersecurity firm Oligo discovered a set of vulnerabilities, named AirBorne, in Apple's AirPlay protocol and SDK earlier this week.
- These flaws originated from AirPlay's open design exposing commands lacking sufficient access controls.
- AirBorne includes 23 bugs enabling zero-click remote code execution on vulnerable Apple and third-party devices via the same network.
- Tens of millions of third-party AirPlay devices likely remain exposed because manufacturers update slowly.
- While Apple patched its platforms, unfixed third-party devices could allow attackers to hijack systems and potentially spread malware.
20 Articles
20 Articles
Researchers find numerous Apple AirPlay vulnerabilities allowing "wormable" exploits over Wi-Fi
Cybersecurity firm Oligo identified several "critical" flaws in Apple's native AirPlay protocol and the AirPlay Software Development Kit (SDK) used by audio and automotive manufacturers. While Apple has patched its platforms, many third-party devices remain exposed due to slow OEM update cycles. Oligo estimates that tens of millions of speakers,...Read Entire Article
Hackers could hijack your AirPlay devices using set of Airborne' flaws
Millions of AirPlay devices may be putting users at risk — and hackers don't even need a password to break in.AirPlay on iPhoneA newly discovered set of flaws, dubbed AirBorne, exposes Apple's AirPlay and CarPlay technology to attacks from hackers on the same Wi-Fi network. According to cybersecurity firm Oligo, the vulnerabilities could allow attackers to hijack third-party smart speakers, TVs, set-top boxes, and other AirPlay-enabled gadgets.A…
Coverage Details
Bias Distribution
- 75% of the sources are Center
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage