Researchers at cybersecurity firm Oligo have found major vulnerabilities in Apple’s AirPlay protocol that allow hackers to breach compatible devices on the same Wi-Fi network.
AirPlay is a Wi-Fi-based protocol that allows Apple users to cast audio and video to devices like speakers, monitors, smart TVs, etc. The vulnerabilities, dubbed “AirBorne,” were found in both Apple’s AirPlay protocol and the AirPlay Software Development Kit (SDK) that third-party vendors use to make their devices AirPlay compatible, Wired reports.
In a video, the researchers demonstrated how the vulnerabilities could be exposed. They accessed an AirPlay-enabled Bose speaker on their network and remotely executed code (an RCE attack) to show the “AirBorne” logo on the speaker’s display. Hackers could use a similar trick to gain access to microphone-equipped devices for espionage, the researchers claim.
CarPlay-equipped infotainment systems are also at risk. Malicious actors could carry out an RCE attack if they are near the CarPlay unit and “the device has a default, predictable, or known Wi-Fi hotspot password.”
Twenty-three vulnerabilities were reported to Apple in the late fall and winter of last year. Oligo worked with Apple for months on fixes before publishing its findings on Tuesday.
Fixes rolled out to Apple devices on March 31 with iOS 18.4, iPadOS 18.4, macOS Ventura 13.7.5, macOS Sonoma 14.7.5, macOS Sequoia 15.4, and visionOS 2.4. However, third-party devices supporting the AirPlay protocol remain exposed. Manufacturers need to roll out an update, and users need to install it themselves to avoid being exposed to threats.
The total number of exposed devices could be in millions, Oligo CTO Gal Elbaz, tells Wired. “Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch—or they will never be patched,” Elbaz says. “And it’s all because of vulnerabilities in one piece of software that affects everything.”
Recommended by Our Editors
According to Oligo’s report, there are several steps you can take to negate the threat:
-
If you’re using an AirPlay-enabled Apple device, update it to the latest software version.
-
Disable the AirPlay function when not in use.
-
Using AirPlay, stream content only to trusted devices.
-
On Apple devices, go to Settings > AirPlay & Continuity (or AirPlay & Handoff) and select Current User for the “Allow AirPlay for” option. This will ensure that only you can stream content to your device.
It’s also best to avoid enabling AirPlay when using a public Wi-Fi network, like those at a cafe, airport, or mall.
Get Our Best Stories!
Stay Safe With the Latest Security News and Updates
By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up!
Your subscription has been confirmed. Keep an eye on your inbox!
About Jibin Joseph
Contributor

Read the latest from Jibin Joseph