Tech

Millions of Apple AirPlay devices susceptible to ‘AirBorne’ zero-click RCE attacks, so patch now

Share
Share


  • Security researchers found dozens of flaws in Apple’s AirPlay protocol
  • Some of them allowed remote code execution attacks
  • Apple has released patches addressing the flaws

Apple’s AirPlay Protocol and AirPlay Software Development Kit (SDK) carried numerous vulnerabilities that could be abused to run remote code execution (RCE) attacks, man-in-the-middle (MitM) attacks, or denial of service (DoS) attacks. To make matters worse, some of these vulnerabilities could be used in zero-click attacks, meaning to pull it off – no interaction from the victim is required.

Cybersecurity researchers Oligo Security found 23 flaws and collectively dubbed them AirBorne. Two of the flaws could be used in RCE attacks, which are now tracked as CVE-2025-24252, and CVE-2025-24132. There is also CVE-2025-24206, a user interaction bypass vulnerability that allows crooks to bypass “Accept” click requirements on AirPlay requests.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
New method quickly assesses underwater landslide risk for offshore turbines
Tech

New method quickly assesses underwater landslide risk for offshore turbines

Illustration of dynamic forces acting on monopile and tower, and soil-structure interaction....

Chuwi’s CoreBook X gets spec bump but lacks graphical muscle
Tech

Chuwi’s CoreBook X gets spec bump but lacks graphical muscle

Chuwi’s new CoreBook X features Intel i9-13900HK and 32GB RAM No discrete...

UK Prices for LG’s 2025 QNED TVs are live, and Samsung should be worried
Tech

UK Prices for LG’s 2025 QNED TVs are live, and Samsung should be worried

LG has revealed pricing for its 2025 QNED TV range The lineup...