Technology
- Home
- Technology
- News
AirPlay security flaws could help hackers spread malware on your network
Cybersecurity firm Oligo has detailed a set of vulnerabilities its researchers found in Apple’s AirPlay protocol and software development kit that could serve as a point of entry to infect other devices on your network, Wired reports. Oligo’s researchers refe…

Published a year ago on May 3rd 2025, 5:00 am
By Web Desk

Cybersecurity firm Oligo has detailed a set of vulnerabilities its researchers found in Apple’s AirPlay protocol and software development kit that could serve as a point of entry to infect other devices on your network, Wired reports.
Oligo’s researchers refer to the vulnerabilities and attacks they enable as “AirBorne.” According to Oligo, two of the bugs it found are “wormable” and could let attackers take over an AirPlay device and spread malware throughout “any local network the infected device connects to.” That said, they would need to already be on the same network as the device to carry out the attack.
Other possible outcomes of an attack include hackers remotely executing code on your devices (also called an RCE attack), accessing local files and sensitive information, and carrying out denial-of-service attacks, Oligo says. It adds that an attacker could also show images on something like a smart speaker’s display — as demonstrated with an AirPlay-enabled Bose speaker in the video below — or tap into the speaker’s microphone to listen to nearby conversations.
[Media: https://www.youtube.com/watch?v=vcs5G4JWab8]
Apple has already patched the bugs, but there are still risks via non-Apple-made AirPlay devices. And while there’s a relatively low chance of a hacker being on your home network, Wired points out that AirBorne attacks could also happen if you connect to a public network with an device that uses AirPlay — like a MacBook or an iPhone — that isn’t updated with the latest Apple software.
The risks extend to CarPlay devices, too. Oligo found that attackers “could execute an RCE attack” via CarPlay under certain conditions, like connecting to a car’s Wi-Fi hotspot that’s still using a “default, predictable or known wifi hotspot password.” Once they’re in, hackers could do things like show images on the car’s infotainment system or track the car’s location, according to Oligo.
As Oligo points out, there are tens of millions of third-party AirPlay devices, including things like standalone speakers, home theater systems, TVs. The firm also notes that CarPlay “is widely-used and available in over 800 vehicle models.” According to Wired, Apple created patches for affected third-party devices” as well, but a cybersecurity expert tells the outlet that Apple doesn’t directly control the patching process of third-party devices.
Apple didn’t immediately respond to The Verge’s request for comment.

SMEDA-JICA project: What’s new for women entrepreneurs in Punjab?
- 8 hours ago
Pak-Turkiye Joint Commandoand Special Forces Exercise successfully conducted in Turkiye
- 9 hours ago
PM Shehbaz arrives in Antalya on visit to Turkiye
- 3 hours ago
Pakistan, Qatar call for coordinated efforts for regional stability, energy security
- 8 hours ago
Why Americans can’t escape credit card debt
- 18 hours ago
Pakistan Navy successfully tests indigenously developed anti-ship missile
- 9 hours ago
IMF MD lauds Pakistan’s continued progress on economic reforms
- 8 hours ago
Load-shedding underway due to gas supply disruptions amid ME conflict: Awais
- 7 hours ago
Field Marshal Munir calls on Iranian Parliament Speaker Ghalibaf
- 8 hours ago
US forces ready to restart combat if Iran doesn’t agree a deal, says Hegseth
- 6 hours ago

Foreign Office says no dates set for second round of US-Iran talks
- 9 hours ago

Spotify now sells printed books
- 11 hours ago
You May Like
Trending







