More

    Millions of Apple AirPlay devices susceptible to ‘AirBorne’ zero-click RCE attacks, so patch now




    • Security researchers found dozens of flaws in Apple’s AirPlay protocol
    • Some of them allowed remote code execution attacks
    • Apple has released patches addressing the flaws

    Apple’s AirPlay Protocol and AirPlay Software Development Kit (SDK) carried numerous vulnerabilities that could be abused to run remote code execution (RCE) attacks, man-in-the-middle (MitM) attacks, or denial of service (DoS) attacks. To make matters worse, some of these vulnerabilities could be used in zero-click attacks, meaning to pull it off – no interaction from the victim is required.

    Cybersecurity researchers Oligo Security found 23 flaws and collectively dubbed them AirBorne. Two of the flaws could be used in RCE attacks, which are now tracked as CVE-2025-24252, and CVE-2025-24132. There is also CVE-2025-24206, a user interaction bypass vulnerability that allows crooks to bypass “Accept” click requirements on AirPlay requests.

    https://cdn.mos.cms.futurecdn.net/FeAq5L2WVvaGMeUirV4wgW.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img