Summary: Newly discovered vulnerabilities in Apple’s AirPlay protocol, dubbed AirBorne, could allow hackers to hijack AirPlay-enabled devices on the same Wi-Fi network. Despite Apple issuing patches for its own devices, millions of third-party products remain vulnerable due to slow or nonexistent updates. The security risks range from data espionage to potentially turning devices into remote listening tools.
Affected: AirPlay-enabled devices, including those from third-party manufacturers, and CarPlay systems in vehicles.
Keypoints :
- AirBorne vulnerabilities allow for remote access and control of AirPlay-enabled devices on the same network.
- Thousands of third-party devices, potentially unpatched for years, remain susceptible to exploitation.
- Risks include ransomware installation and data espionage via compromised devices with microphones.