• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Wormable AirPlay Flaws Allow Zero-Click on RCE on Apple Units by way of Public Wi-Fi

Admin by Admin
May 5, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Might 05, 2025Ravie LakshmananCommunity Safety / Vulnerability

Wormable AirPlay Flaws

Cybersecurity researchers have disclosed a collection of now-patched safety vulnerabilities in Apple’s AirPlay protocol that, if efficiently exploited, may allow an attacker to take over inclined gadgets supporting the proprietary wi-fi know-how.

The shortcomings have been collectively codenamed AirBorne by Israeli cybersecurity firm Oligo.

“These vulnerabilities could be chained by attackers to probably take management of gadgets that assist AirPlay – together with each Apple gadgets and third-party gadgets that leverage the AirPlay SDK,” safety researchers Uri Katz, Avi Lumelsky, and Gal Elbaz mentioned.

A few of the vulnerabilities, like CVE-2025-24252 and CVE-2025-24132, could be strung collectively to style a wormable zero-click RCE exploit, enabling dangerous actors to deploy malware that propagates to gadgets on any native community the contaminated gadget connects to.

Cybersecurity

This might then pave the best way for stylish assaults that may result in the deployment of backdoors and ransomware, posing a critical safety threat.

The vulnerabilities, in a nutshell, may allow zero- or one-click distant code execution (RCE), entry management checklist (ACL) and consumer interplay bypass, native arbitrary file learn, info disclosure, adversary-in-the-middle (AitM) assaults, and denial-of-service (DoS).

This consists of chaining CVE-2025-24252 and CVE-2025-24206 to attain a zero-click RCE on macOS gadgets which can be related to the identical community as an attacker. Nevertheless, for this exploit to succeed, the AirPlay receiver must be on and set to the “Anybody on the identical community” or “Everybody” configuration.

In a hypothetical assault state of affairs, a sufferer’s gadget may get compromised when related to a public Wi-Fi community. Ought to the gadget be related later to an enterprise community, it may present an attacker with a strategy to breach different gadgets which can be related to the identical community.

A few of the different notable flaws are listed beneath –

  • CVE-2025-24271 – An ACL vulnerability that may allow an attacker on the identical community as a signed-in Mac to ship AirPlay instructions to it with out pairing
  • CVE-2025-24137 – A vulnerability that might trigger arbitrary code execution or an utility to terminate
  • CVE-2025-24132 – A stack-based buffer overflow vulnerability that might end in a zero-click RCE on audio system and receivers that leverage the AirPlay SDK
  • CVE-2025-24206 – An authentication vulnerability that might permit an attacker on the native community to bypass authentication coverage
  • CVE-2025-24270 – A vulnerability that might permit an attacker on the native community to leak delicate consumer info
  • CVE-2025-24251 – A vulnerability that might permit an attacker on the native community to trigger an sudden app termination
  • CVE-2025-31197 – A vulnerability that might permit an attacker on the native community to trigger an sudden app termination
  • CVE-2025-30445 – A sort confusion vulnerability that might may permit an attacker on the native community to trigger an sudden app termination
  • CVE-2025-31203 – An integer overflow vulnerability that might permit an attacker on the native community to trigger a DoS situation
Cybersecurity

Following accountable disclosure, the recognized vulnerabilities have been patched within the beneath variations –

  • iOS 18.4 and iPadOS 18.4
  • iPadOS 17.7.6
  • macOS Sequoia 15.4
  • macOS Sonoma 14.7.5
  • macOS Ventura 13.7.5
  • tvOS 18.4, and
  • visionOS 2.4

A few of the weaknesses (CVE-2025-24132 and CVE-2025-30422) have additionally been patched in AirPlay audio SDK 2.7.1, AirPlay video SDK 3.6.0.126, and CarPlay Communication Plug-in R18.1.

“For organizations, it’s crucial that any company Apple gadgets and different machines that assist AirPlay are up to date instantly to the newest software program variations,” Oligo mentioned.

“Safety leaders additionally want to offer clear communication to their workers that every one of their private gadgets that assist AirPlay have to even be up to date instantly.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.



Tags: AirPlayAppleDevicesEnableFlawsPublicRCEWiFiWormableZeroClick
Admin

Admin

Next Post
Methods to Earn Extra Leads and Income On-line for Actual Property

Methods to Earn Extra Leads and Income On-line for Actual Property

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

AMD CEO Lisa Su Isn’t Afraid of the Competitors

AMD CEO Lisa Su Isn’t Afraid of the Competitors

December 13, 2025
A SQL MERGE assertion performs actions primarily based on a RIGHT JOIN

The JDBC driver Maven Central coordinates for the preferred RDBMS

April 20, 2025

Trending.

10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

September 8, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Alibaba Workforce Open-Sources CoPaw: A Excessive-Efficiency Private Agent Workstation for Builders to Scale Multi-Channel AI Workflows and Reminiscence

Alibaba Workforce Open-Sources CoPaw: A Excessive-Efficiency Private Agent Workstation for Builders to Scale Multi-Channel AI Workflows and Reminiscence

March 1, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Slay the Spire 2 Assessment

Slay the Spire 2 Assessment

March 14, 2026
Key Features and Pricing Defined

Key Features and Pricing Defined

March 14, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved