Tuesday, 02 January 2024 12:17 GMT

Critical Airplay 'Airborne' Flaws Put Billions Of Apple Devices At Risk


(MENAFN- The Peninsula) Oussama Abbassi | The Peninsula

Doha, Qatar: If you haven't updated your IOS system yet, you might be vulnerable to zero-click full access ransomware or espionage attacks, according to a recent report released by Oligo Security firm.

The report states that a set of severe security vulnerabilities, collectively dubbed 'Airborne,' has been uncovered in Apple's AirPlay protocol, exposing billions of Apple devices to a risk of sophisticated undetectable cyberattacks.

The devices at risk include iPhones, iPads, Macs, Apple TVs, and third-party AirPlay-enabled products such as smart TVs, cars' infotainment systems, and even speakers.

Speaking to the WIRED, researchers from Oligo Security demonstrated how these vulnerabilities could allow hackers using the same Wi-Fi network to easily and undetectably take over AirPlay-enabled devices, and use them as footholds for further attacks, such as installing ransomware or conducting espionage.

Similar attacks have been observed during the past few years, including the infamous 'Pegasus' malware.

The vulnerabilities, first disclosed in early 2025, consist of 23 distinct flaws, 17 of which have been assigned CVE identifies, which allow zero-click remote code execution and 'wormable' exploits, according to an adjacent report released by Kaspersky's official blog.

This 'wormable' nature of the exploits could lead to widespread malware outbreaks, affecting not only Apple devices but also third-party products like smart-home systems and CarPlay-enabled infotainment systems, as those may not get any security patches or updates from Apple, rendering them especially vulnerable.

This is notably dangerous for CarPlay users, as Oligo Security highlighted in their report, vehicles with predictable or default Wi-Fi passwords are at risk of zero-click attacks, potentially allowing backdoors for hackers to eavesdrop on conversations or even track vehicle locations.

The danger of these 'AirBorne' vulnerabilities lies in their capability of allowing zero-click attacks, meaning no user interaction is needed for a hacker or spy to gain total control of a device.

As of now, there are no reports or information confirming that specific regions or markets have been the focus of these vulnerabilities.

The risk is global and depends on device configuration and update status rather than geographical location.

Apple has also responded swiftly to the crisis.

According to a statement provided to WIRED, the company collaborated with Oligo Security to identify and patch the vulnerabilities, releasing security updates on March 31, 2025.

Apple has also updated its AirPlay SDK for third-party manufacturers, though many non-Apple devices remain vulnerable pending patches from their vendors.

While the potential risk still require extra caution, Apple emphasized that exploiting these flaws requires attackers to be on the same Wi-Fi network, and sensitive user data on devices like TVs, cars, and speakers is typically limited.

Cybersecurity experts are also urging users worldwide to update their Apple devices to the latest versions immediately to protect against these vulnerabilities.

For Apple devices, this means users should ensure they are running iOS version 18.4 or higher for iPhones and iPads; Ventura 13.7.5, Sonoma 14.7.5, Sequoia 15.4 or higher for Macs; tvOS 18.4 for Apple TVs, and visionOS 2.4.

If, for any reason, users are not able to update their systems, experts advise to deactivate the AirPlay feature in their Apple devices from the settings menu, and to exercise caution when dealing with sensitive information and locations.

For more information, click here to read the full report.

MENAFN21052025000063011010ID1109579085


Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.

Search