Monday, June 16, 2025

Wormable AirPlay Flaws Allow Zero-Click on RCE on Apple Units by way of Public Wi-Fi


Might 05, 2025Ravie LakshmananCommunity Safety / Vulnerability

Cybersecurity researchers have disclosed a collection of now-patched safety vulnerabilities in Apple’s AirPlay protocol that, if efficiently exploited, might allow an attacker to take over prone units supporting the proprietary wi-fi know-how.

The shortcomings have been collectively codenamed AirBorne by Israeli cybersecurity firm Oligo.

“These vulnerabilities might be chained by attackers to doubtlessly take management of units that help AirPlay – together with each Apple units and third-party units that leverage the AirPlay SDK,” safety researchers Uri Katz, Avi Lumelsky, and Gal Elbaz stated.

A few of the vulnerabilities, like CVE-2025-24252 and CVE-2025-24132, might be strung collectively to vogue a wormable zero-click RCE exploit, enabling unhealthy actors to deploy malware that propagates to units on any native community the contaminated gadget connects to.

Cybersecurity

This might then pave the way in which for classy assaults that may result in the deployment of backdoors and ransomware, posing a critical safety danger.

The vulnerabilities, in a nutshell, might allow zero- or one-click distant code execution (RCE), entry management listing (ACL) and person interplay bypass, native arbitrary file learn, info disclosure, adversary-in-the-middle (AitM) assaults, and denial-of-service (DoS).

This contains chaining CVE-2025-24252 and CVE-2025-24206 to realize a zero-click RCE on macOS units which are related to the identical community as an attacker. Nonetheless, for this exploit to succeed, the AirPlay receiver must be on and set to the “Anybody on the identical community” or “Everybody” configuration.

In a hypothetical assault situation, a sufferer’s gadget might get compromised when related to a public Wi-Fi community. Ought to the gadget be related later to an enterprise community, it might present an attacker with a option to breach different units which are related to the identical community.

A few of the different notable flaws are listed under –

  • CVE-2025-24271 – An ACL vulnerability that may allow an attacker on the identical community as a signed-in Mac to ship AirPlay instructions to it with out pairing
  • CVE-2025-24137 – A vulnerability that might trigger arbitrary code execution or an software to terminate
  • CVE-2025-24132 – A stack-based buffer overflow vulnerability that might end in a zero-click RCE on audio system and receivers that leverage the AirPlay SDK
  • CVE-2025-24206 – An authentication vulnerability that might enable an attacker on the native community to bypass authentication coverage
  • CVE-2025-24270 – A vulnerability that might enable an attacker on the native community to leak delicate person info
  • CVE-2025-24251 – A vulnerability that might enable an attacker on the native community to trigger an sudden app termination
  • CVE-2025-31197 – A vulnerability that might enable an attacker on the native community to trigger an sudden app termination
  • CVE-2025-30445 – A kind confusion vulnerability that might might enable an attacker on the native community to trigger an sudden app termination
  • CVE-2025-31203 – An integer overflow vulnerability that might enable an attacker on the native community to trigger a DoS situation
Cybersecurity

Following accountable disclosure, the recognized vulnerabilities have been patched within the under variations –

  • iOS 18.4 and iPadOS 18.4
  • iPadOS 17.7.6
  • macOS Sequoia 15.4
  • macOS Sonoma 14.7.5
  • macOS Ventura 13.7.5
  • tvOS 18.4, and
  • visionOS 2.4

A few of the weaknesses (CVE-2025-24132 and CVE-2025-30422) have additionally been patched in AirPlay audio SDK 2.7.1, AirPlay video SDK 3.6.0.126, and CarPlay Communication Plug-in R18.1.

“For organizations, it’s crucial that any company Apple units and different machines that help AirPlay are up to date instantly to the newest software program variations,” Oligo stated.

“Safety leaders additionally want to offer clear communication to their workers that every one of their private units that help AirPlay have to even be up to date instantly.”

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com