Many users are estimated by Apple’s Airplay, but you can leave your pirates vulnerable.
Oligo cybersecurity firm researchers found main security defects in Apple Airplay, which allow pirates to abduct compatible devices on the same Wi-Fi network.
Airplay allows users to perfectly transmit audio, video or photos from their Apple device to another Apple device or third party appliances that make up the protocol.
The 23 vulnerabilities, called “Airborne”, were found in both Apple’s Airplay protocol and the Airplay Software Development Kit (SDK) used by third -party vendors to make compatible with Airplay devices, reported Wired.
The researchers showed in a video how vulnerabilities can be exposed to pirates by accessing a bose -enabled Bose speaker on the same network and remotely executing a remote codes attack (RCE), showing the “ aerial ” logo on the speaker screen.
They claimed that hackers can use a similar strategy to access microphone devices for espionage.
Oligo Cto Gal Elbaz told Wired that the total number of devices exposed could be in the millions.
“Because Airplay is compatible with a wide variety of devices, there are many years since it will take or never be patches,” explained Elbaz. “And everything is because of the vulnerabilities of a software that affects everything.”
The risks were reported to Apple at the end of autumn and winter last year, and Oligo worked with the technological giant for months in solutions before publishing his findings on Tuesday.
Apple devices with iOS 18.4, iPados 18.4, Macos Ventura 13.7.5, Macos Sonoma 14.7.5, Macos Sequoia 15.4 and Visionos 2.4 had solutions on March 31.
However, third -party devices that support the Airplay protocol remain vulnerable. Researchers said that manufacturers should publish updates for users to install in order to avoid being exposed to hackers.

Apple told Wired that he created patches available for these third -party devices, but emphasized that there are “limitations” for attacks that would be possible on AirPlay skills due to errors.
Carplay -equipped systems are also at risk, researchers pointed out, as hackers can carry out an RCE attack if they are near the unit and “the device has a default, predictable or well -known password.”
According to the report, there are several ways to help protect the device from the pirate threat:
- Person your devices: The researchers emphasized that the devices and other machines that admit Airplay must be updated immediately to the latest software versions to mitigate the possible security risks.
- Disable AirPlay receptor: Oligo recommends deactivating the AirPlay function completely when not used.To
- Only Airplay to trust devices: Limit AirPlay communication and reproduction content only to trusted devices.
- Restrict aerial reproduction settings: Go to Settings> AirPlay & Continuity (or AirPlay & Handoff) and select the current user for the “Allow Airplay for” option. “Although this does not prevent all the problems mentioned in the report, it reduces the protocol attack area,” researchers said.
- Turn off the public Wi-Fi: It is best to avoid enable or use Airplay when it is on a public Wi-Fi network.
#Urgent #notice #iPhone #users #turn #popular #function #steps #safety
Image Source : nypost.com