AirBorne flaws can lead to fully hijack Apple devices

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

Vulnerabilities in Apple’s AirPlay protocol and SDK exposed Apple and third-party devices to attacks, including remote code execution.

Oligo Security found serious flaws, collectively tracked as AirBorne, in Apple’s AirPlay protocol and SDK, affecting Apple and third-party devices. Attackers can exploit the vulnerabilities to perform zero-/one-click RCE, bypass ACLs, read local files, steal data, and execute MITM or DoS attacks. These flaws can be chained to fully hijack devices over wireless or peer-to-peer connections.

The AirBorne vulnerabilities don’t affect all Apple devices, but with 2.35 billion active Apple devices globally, including 100+ million Macs and tens of millions of AirPlay-enabled third-party devices, the potential impact is vast.

The researchers found that two issues, tracked as CVE-2025-24252 and CVE-2025-24132, enable wormable zero-click RCE, letting attackers hijack AirPlay-enabled devices and spread malware across local networks. This poses risks of espionage, ransomware, and supply-chain attacks, with broad impact due to AirPlay’s presence in Apple and third-party devices.

“Oligo has demonstrated that two of the vulnerabilities (CVE-2025-24252 and CVE-2025-24132) allow attackers to weaponize wormable zero-click RCE exploits. This means that an attacker can take over certain AirPlay-enabled devices and do things like deploy malware that spreads to devices on any local network the infected device connects to. This could lead to the delivery of other sophisticated attacks related to espionage, ransomware, supply-chain attacks, and more.” reads the report published by Oligo Security. “Because AirPlay is a fundamental piece of software for Apple devices (Mac, iPhone, iPad, AppleTV, etc.) as well as third-party devices that leverage the AirPlay SDK, this class of vulnerabilities could have far-reaching impacts.”

CVE-2025-24252 is a critical use-after-free vulnerability in macOS, a remote attacker can trigger the flaw to execute arbitrary code. When chained with CVE-2025-24206, it allows zero-click, wormable attacks on devices with AirPlay enabled on open network settings. Attackers can exploit this to spread malware across networks without user interaction, even via public WiFi.

CVE-2025-24132 is a stack-based buffer overflow flaw in the AirPlay SDK, enabling zero-click, wormable RCE on all supported speakers and receivers. Exploits can spread without user interaction, leading to outcomes from playing media to serious intrusions like eavesdropping via device microphones in sensitive environments.

Oligo reported 23 vulnerabilities to Apple, and 17 CVEs were issued. Apple and Oligo collaborated to identify and patch the issues, releasing updates and following responsible disclosure practices.

To reduce risk, users should update devices, disable AirPlay Receiver if unused, restrict AirPlay access via firewall (port 7000), and set “Allow AirPlay for” to “Current User” to limit exposure.

“For organizations, it is imperative that any corporate Apple devices and other machines that support AirPlay are updated immediately to the latest software versions. Security leaders also need to provide clear communication to their employees that all of their personal devices that support AirPlay need to also be updated immediately.” concludes the report.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Apple’s AirPlay, AirBorne)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 1 year ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 1 year ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 1 year ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 1 year ago

LATEST POSTS