AirBorne漏洞:超过23.5亿苹果设备和数千万第三方设备面临远程代码执行攻击风险
Apple的AirPlay协议被发现存在严重漏洞(AirBorne),影响23.5亿台设备及第三方产品。攻击者可通过同一Wi-Fi网络远程执行代码,无需用户交互。研究人员发现23个漏洞,包括内存错误、缓冲区溢出及认证绕过等问题。苹果已发布补丁修复部分问题,但第三方设备可能长期暴露风险。 2025-4-29 14:14:56 Author: cybersecuritynews.com(查看原文) 阅读量:16 收藏

AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi

A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active Apple devices and tens of millions of third-party gadgets to remote code execution (RCE) attacks requiring no user interaction.

Researchers at Oligo Security discovered that the flaw allows attackers on the same Wi-Fi network to hijack devices ranging from Macs and iPhones to CarPlay-enabled vehicles and smart speakers.

AirBorne Vulnerabilities

The Airborne vulnerabilities stem from flaws in Apple’s AirPlay protocol and its Software Development Kit (SDK), which third-party manufacturers use to integrate AirPlay compatibility. Oligo identified 23 vulnerabilities, 17 of which received CVE designations, including:

Google News

  • CVE-2025-24252: A use-after-free flaw in macOS’s AirPlay implementation that, when chained with authentication bypass (CVE-2025-24206), enables zero-click RCE on devices set to “Anyone on the same network”.

  • CVE-2025-24132: A stack-based buffer overflow in the AirPlay SDK affecting speakers, TVs, and CarPlay systems, allowing wormable zero-click exploits.

  • CVE-2025-24271: An access control list (ACL) bypass lets attackers send unauthenticated AirPlay commands, which can be weaponized with other flaws for one-click RCE.

These vulnerabilities exploit AirPlay’s handling of property lists (plists), structured data formats used to serialize commands. Improper validation of plist parameters, such as assuming all inputs are dictionaries, led to type confusion, memory corruption, and arbitrary code execution.

For example, sending malformed plists via the /setProperty command crashes the ControlCenter process, while flooding RTSP SETUP requests can overload the WindowServer service, forcibly logging users out.

Attack Vectors and Real-World Impact

Attackers can leverage Airborne in multiple scenarios:

Macs and iOS devices with AirPlay receiver enabled (default: “Current User”) are vulnerable to zero-click attacks if paired with CVE-2025-24206. Oligo demonstrated exploiting this to overwrite memory in Apple’s Music app, potentially spreading malware across networks.

Third-party speakers and CarPlay units using the vulnerable SDK are equally at risk. Researchers hijacked a Bose speaker to display custom logos and audio.

The buffer overflow (CVE-2025-24132) permits self-propagating attacks. A compromised device on a corporate network could infect others without user interaction, enabling lateral movement for espionage or ransomware. Public Wi-Fi hotspots, like those in airports, are prime targets for mass exploitation.

Over 800 car models with wireless CarPlay are vulnerable to proximity-based attacks. If a vehicle’s Wi-Fi hotspot uses a weak password, attackers within range can execute RCE to manipulate infotainment systems-playing disruptive audio, tracking locations, or eavesdropping via built-in microphones. Bluetooth-based pairing (requiring PIN entry) and USB connections also pose risks.

Apple’s Response and Patch Status

Apple released patches in macOS Sequoia 15.4, iOS 18.4, and AirPlay SDK 2.7.1/3.6.0.126 to address these issues. However, Oligo warns that many third-party devices may remain unpatched indefinitely due to fragmented update mechanisms.

Gal Elbaz, Oligo’s co-founder, emphasized, “AirPlay’s integration into diverse ecosystems means some devices will linger vulnerable for years”.

To minimize exposure:

  1. Update Apple Devices: Ensure all Apple products run the latest OS versions.
  2. Disable AirPlay Receiver: Turn off AirPlay in settings if unused.
  3. Network Hardening: Restrict port 7000 (AirPlay) to trusted devices via firewalls.
  4. Third-Party Vigilance: Contact manufacturers for SDK updates and monitor for firmware patches.

The AirBorne flaws underscore systemic risks in widely adopted protocols. As Apple’s ecosystem expands- 2.35 billion active devices as of January 2025- and third-party integrations proliferate, coordinated disclosure and rapid patching are critical.

Yet, the longevity of unpatched devices in consumer and industrial settings remains a persistent challenge, highlighting the need for proactive security frameworks in IoT development.

Apple has not reported active exploitation but has confirmed the severity of the vulnerabilities, urging immediate updates. For enterprises, Oligo recommends segmenting networks to isolate AirPlay-enabled devices and auditing connected endpoints for signs of compromise.

Are you from the SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.


文章来源: https://cybersecuritynews.com/airplay-zero-click-rce-vulnerability/
如有侵权请联系:admin#unsafe.sh