
Critical AirPlay Vulnerabilities Expose Millions to Hacking: Are Your Devices at Risk?
Millions of devices using Apple's AirPlay technology are vulnerable to hacking, cybersecurity researchers at Oligo Security have revealed. Dubbed "AirBorne," these vulnerabilities could allow attackers to remotely execute code, access sensitive information, and even spread malware across your network. The implications are significant, raising questions about the security of our connected devices and the potential for widespread exploitation.
Oligo detailed how the flaws in Apple’s AirPlay protocol and Software Development Kit (SDK) present an entry point for infecting other devices on the same network. Two of the bugs are even “wormable,” meaning attackers could take control of an AirPlay device and use it to spread malware throughout any local network it connects to. This poses a serious threat to both individual users and organizations, especially given the prevalence of AirPlay-enabled devices.

The potential consequences of exploiting these vulnerabilities are alarming. According to Oligo, hackers could remotely execute code on your devices, access local files and sensitive data, and launch denial-of-service attacks. Imagine your smart speaker displaying unwanted images or, even worse, being used to eavesdrop on your conversations. The vulnerabilities also affect CarPlay, the in-car entertainment system, potentially allowing hackers to hijack a car's computer system by showing images on the infotainment system or even tracking the car’s location.
Oligo’s research highlights also the risks extends to non-Apple made AirPlay devices: "When third-party manufacturers integrate Apple technologies like AirPlay via an SDK, obviously Apple no longer has direct control over the hardware or the patching process," says Patrick Wardle, CEO of the Apple device-focused security firm DoubleYou.
While Apple has released patches for the identified bugs, the risk persists, particularly for third-party devices that may not receive timely updates. “The amount of devices that were vulnerable to these issues, that's what alarms me," says Oligo researcher Uri Katz. “When was the last time you updated your speaker?” This question underscores the importance of keeping all your connected devices up to date with the latest security patches.
Oligo shared 23 security vulnerabilities to Apple, collectively known as “AirBorne”, and advises users to immediately update any corporate Apple devices and AirPlay-enabled devices to the latest software release and ask employees to also update all their personal AirPlay devices. Other measures users can take includes disabling the AirPlay receiver if not used, restricting AirPlay access to trusted devices using firewall rules, and reducing the attack surface by only allowing AirPlay for the current user.
With over 2.35 billion active Apple devices globally, plus tens of millions of third-party audio devices and car infotainment systems with AirPlay support, the potential impact of these vulnerabilities is immense. Apple created patches for affected third-party devices, but a cybersecurity expert tells the outlet that Apple doesn’t directly control the patching process of third-party devices.
The discovery of the "AirBorne" vulnerabilities serves as a stark reminder of the security challenges inherent in our increasingly connected world. It's crucial to stay informed about potential threats and take proactive steps to protect your devices and data.
What are your thoughts on these vulnerabilities? How are you securing your AirPlay-enabled devices? Share your comments and concerns below.