Researchers have disclosed a remote CarPlay vulnerability that allows attackers to spy on drivers and cause distractions. The exploit leverages weaknesses in Apple’s AirPlay and iAP2 protocols, with many vehicles remaining unpatched worldwide. #AppleCarPlay #AirPlayVulnerabilities
Keypoints
- Researchers revealed a remote attack method targeting Apple CarPlay systems.
- The attack exploits vulnerabilities in AirPlay and the iAP2 protocol used for wireless connections.
- Attackers can connect via USB, Wi-Fi, or Bluetooth, often using default passwords or simple pairing.
- The vulnerability allows remote code execution, enabling attackers to distract or eavesdrop on drivers.
- Most automakers have not yet applied the necessary security patches, leaving many vehicles exposed.