AirPlay Security Flaws Impact Third-Party Devices and Unpatched Apple Products - MacRumors
Skip to Content

AirPlay Security Flaws Impact Third-Party Devices and Unpatched Apple Products

Researchers at cybersecurity firm Oligo today outlined a series of AirPlay vulnerabilities that impact millions of Apple devices (via Wired) and accessories that connect to Apple devices. While Apple has addressed the flaws in security updates that have come out over the last several months, some third-party devices that support ‌AirPlay‌ remain vulnerable.

AirPlay Feature
Dubbed "Airborne," the ‌AirPlay‌ vulnerabilities allowed attackers to take control of devices that support ‌AirPlay‌ to spread malware to other devices on any local device that the infected device connects to. An attacker would need to be on the same Wi-Fi network as the intended victim, putting public Wi-Fi spots, businesses, and other high-traffic areas at more risk.

Oligo researchers said that the ‌AirPlay‌ flaws could lead to "sophisticated attacks related to espionage, ransomware, supply-chain attacks, and more." The vulnerabilities could be used independently or chained together for a "variety of possible attack vectors," such as Remote Code Execution, user interaction bypass, Denial of Service attacks, Man-in-the-Middle attacks, and more.

Apple worked with Oligo to identify and fix the vulnerabilities. Oligo found 23 separate security flaws, and Apple issued 17 CVEs to address them. Information on each vulnerability is outlined on Oligo's website. Apple also deployed fixes for its ‌AirPlay‌ SDK for third-party manufacturers.

The same Airborne vulnerabilities also impact CarPlay, which could allow hackers to hijack the automotive computer in a car. This attack vector would require the attacker to be directly in the car and connected to either the car's Bluetooth or an in-car USB port, which makes it unlikely.

Oligo recommends that users upgrade to the latest versions of iOS, iPadOS, macOS, tvOS, and visionOS, to protect themselves from these vulnerabilities. Other devices that support ‌AirPlay‌ may still be vulnerable, so users should take steps like disabling the ‌AirPlay‌ Receiver feature on Macs and restricting ‌AirPlay‌ to the current user instead of all users.

Oligo CTO Gal Elbaz told Wired that there could be tens of millions of third-party ‌AirPlay‌ devices that are still vulnerable to attack. Because ‌AirPlay‌ is supported in such a wide variety of devices, there are a lot that will take years to patch--or they will never be patched," he said.

Tag: AirPlay

Popular Stories

iOS 26

iOS 26.4 Adds Two New Features to CarPlay

Tuesday March 24, 2026 1:55 pm PDT by
iOS 26.4 was released today, and it includes a couple of new features for CarPlay: an Ambient Music widget and support for voice-based chatbot apps. To update your iPhone 11 or newer to iOS 26.4, open the Settings app and tap on General → Software Update. CarPlay will automatically offer the new features so long as the iPhone connected to your vehicle is running iOS 26.4 or later....
Apple Business hero

Apple Unveils 'Apple Business' All-in-One Platform

Tuesday March 24, 2026 8:53 am PDT by
Apple today announced Apple Business, a new all-in-one platform that unifies device management, productivity tools, and customer outreach features. The service is designed to be a consolidated replacement for several of Apple's existing business-focused offerings, including Apple Business Essentials, Apple Business Manager, and Apple Business Connect. It provides organizations with a single...
AirPods Pro Firmware Feature

Apple Releases New Firmware for AirPods Pro 3, AirPods Pro 2 and AirPods 4

Tuesday March 24, 2026 12:31 pm PDT by
Apple today released new firmware for the AirPods Pro 2, AirPods Pro 3, and the AirPods 4. The firmware has a version number of 8B39, up from 8B34 on the AirPods Pro 3, 8B28 on the AirPods Pro 2, and 8B21 on the AirPods 4. There is no word on what's included in the firmware, but Apple has a support document with limited notes. Most updates are limited to bug fixes and performance...

Top Rated Comments

12 months ago

Maybe I’m overlooking something obvious though.
Yes you are. That big Samsung touch screen in the meeting room where everyone wo ever has a meeting connects, and which is reachable from the company's guest WiFi.
Score: 10 Votes (Like | Disagree)
vertsix Avatar
12 months ago
I hope they deploy an update to my dear AirPort Express to patch this.
Score: 10 Votes (Like | Disagree)
12 months ago

Most of this stuff sounds cool in a lab, but isn’t real


For example…

“An attacker would need to be on the same Wi-Fi network as the intended victim”

So he has your Wi-Fi password or you’re doing AirPlay over public Wi-Fi?



“This attack vector would require the attacker to be directly in the car”.

If you have an attacker in your car, there’s a lot of attack vectors he can use that don’t involve CarPlay. I think you have bigger problems then your CarPlay being hacked.
I don’t think you have to be “doing” AirPlay over public WiFi, but have an unpatched AirPlay compatible device on a WiFi network with the attacker.

As far as CarPlay, this could be a very big issue for rental car companies. I don’t know about you, but I take rental cars on family trips. Never occurred to me that Avis could infect my iPhone 🤔
Score: 10 Votes (Like | Disagree)
12 months ago
Note that despite all of Sequoia's kabuki theatre to protect us, it was still vulnerable. This is why many of us argue that instead of protecting our computers from us, Apple should be focused on basics. I am not worried about evils maids. I am worried about attacks over the network. The standard for this for decades starts with minimizing the attack surface area.

For years, I've argued for two obvious changes:
1) Don't run daemons/services/etc that aren't enabled. Don't start them, don't wake them, don't run them. If I have it turned off, I don't want to see the process running. I don't want to see log entries for it. I want it off.
2) Apple's services shouldn't be exempt from the firewall by default. The opposite and then the software tested with everything blocked by default rather than giving built-in software a bypass.
Score: 9 Votes (Like | Disagree)
12 months ago

It can't "infect your phone" 🥴
Did I misread it? The article describes the vulnerability as being able to execute and spread malicious code to unpatched systems. If that’s the case, how else does one define “infect”?
Score: 7 Votes (Like | Disagree)
mw360 Avatar
12 months ago

Most of this stuff sounds cool in a lab, but isn’t real


For example…

“An attacker would need to be on the same Wi-Fi network as the intended victim”

So he has your Wi-Fi password or you’re doing AirPlay over public Wi-Fi?



“This attack vector would require the attacker to be directly in the car”.

If you have an attacker in your car, there’s a lot of attack vectors he can use that don’t involve CarPlay. I think you have bigger problems then your CarPlay being hacked.
Somebody always does that 'bigger problems' fallacy. You're assuming the attacks come from your wifi network or your car. People connect to wifi networks in hotels and at their workplaces, and people connect to rental cars and company cars. Just because you don't doesn't mean nobody does.
Score: 6 Votes (Like | Disagree)