Sunday, May 18, 2025
HomeCVE/vulnerabilityWormable AirPlay Zero-Click RCE Flaw Allows Remote Device Hijack via Wi-Fi

Wormable AirPlay Zero-Click RCE Flaw Allows Remote Device Hijack via Wi-Fi

Published on

SIEM as a Service

Follow Us on Google News

A major set of vulnerabilities-collectively named “AirBorne”-in Apple’s AirPlay protocol and SDK have been unveiled, enabling an array of severe attack vectors.

Most critically, these flaws allow zero-click “wormable” Remote Code Execution (RCE), meaning attackers can take over Apple and third-party devices via Wi-Fi without any user interaction.

The impact spans billions of devices globally, including Macs, iPhones, iPads, Apple TV, CarPlay systems, and third-party AirPlay-enabled speakers.

- Advertisement - Google News

The Airborne Threat

Airborne exposes devices to attacks that can cascade rapidly across networks. The vulnerabilities make it possible for a remote attacker to:

  • Hijack devices without any user action (zero-click RCE)
  • Deploy self-propagating malware (“wormable” exploits)
  • Eavesdrop on conversations via device microphones
  • Exfiltrate sensitive information
  • Launch further attacks, including ransomware and supply-chain intrusions

The technical heart of the threat is the ability for attackers to bypass authentication, execute arbitrary code, and spread automatically to other vulnerable devices on the same or new networks scenario ripe for large-scale exploitation.

How Does the Attack Work?

AirPlay communicates over port 7000 and relies on the plist data format for commands.

Oligo’s researchers found that improper handling of these property lists (among other flaws) can enable multiple forms of exploitation:

  • Type Confusion (e.g., CVE-2025-24129)
  • Use-After-Free (e.g., CVE-2025-24252)
  • Stack-based Buffer Overflow (e.g., CVE-2025-24132)
  • Access Control List (ACL) Bypass (e.g., CVE-2025-24271)
  • User Interaction Bypass (e.g., CVE-2025-24206)

A particularly dangerous scenario unfolds when a compromised device joins another network (like an employee connecting to an office Wi-Fi after infection in a public place).

Wormable exploits can then propagate silently, hijacking additional devices.

CVEAttack TypeAffected Devices / SoftwareSecurity Advisories / Patches
CVE-2025-24252Zero-Click Wormable RCEmacOS, tvOS, iOS, iPadOS, visionOSmacOS Sequoia 15.4, tvOS 18.4, iOS 18.4, etc.
CVE-2025-24132Zero-Click Wormable RCEAirPlay audio/video SDK, CarPlayAirPlay audio SDK 2.7.1, CarPlay Plug-in R18.1
CVE-2025-24206User Interaction BypassmacOS, tvOS, iOS, iPadOS, visionOSmacOS Sequoia 15.4, iOS 18.4, etc.
CVE-2025-24271ACL Bypass, One-Click RCEmacOS, tvOS, iOS, iPadOS, visionOSmacOS Sequoia 15.4, iOS 18.4, etc.
CVE-2025-24137One-Click RCEmacOS, visionOS, tvOS, iOS, iPadOSmacOS 14.7.3, tvOS 18.3, iOS 18.3, etc.

Devices at Risk

  • Apple Devices: Macs, iPhones, iPads, Apple TVs, Vision Pro
  • CarPlay: Embedded in over 800 vehicle models, vulnerable under several conditions
  • Third-Party Devices: Tens of millions of speakers, TVs, and receivers with AirPlay SDK
  • Potential Impact: Over 2.35 billion active Apple devices worldwide

Attackers can inject malicious commands to perform actions ranging from playing unwanted media, distracting drivers in CarPlay, to activating microphones for surveillance.

Oligo Security disclosed 23 vulnerabilities, with Apple issuing 17 CVEs and releasing patches across its platforms.

Collaboration between Apple and Oligo ensured rapid mitigation, though users must update devices immediately to close off these critical holes.

Apple software updates covering these CVEs are available now. Delaying updates dramatically increases exposure, especially for users of public or untrusted Wi-Fi.

The Airborne vulnerabilities highlight the evolving sophistication and risk of wireless protocol flaws.

Zero-click, wormable exploits stand among the most severe, with the potential to disrupt millions of users and critical infrastructure. Prompt updating and ongoing vigilance are crucial to defense.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...