Technology
- Home
- Technology
- News
AirPlay security flaws could help hackers spread malware on your network
Cybersecurity firm Oligo has detailed a set of vulnerabilities its researchers found in Apple’s AirPlay protocol and software development kit that could serve as a point of entry to infect other devices on your network, Wired reports. Oligo’s researchers refe…

Published 3 months ago on May 3rd 2025, 5:00 am
By Web Desk

Cybersecurity firm Oligo has detailed a set of vulnerabilities its researchers found in Apple’s AirPlay protocol and software development kit that could serve as a point of entry to infect other devices on your network, Wired reports.
Oligo’s researchers refer to the vulnerabilities and attacks they enable as “AirBorne.” According to Oligo, two of the bugs it found are “wormable” and could let attackers take over an AirPlay device and spread malware throughout “any local network the infected device connects to.” That said, they would need to already be on the same network as the device to carry out the attack.
Other possible outcomes of an attack include hackers remotely executing code on your devices (also called an RCE attack), accessing local files and sensitive information, and carrying out denial-of-service attacks, Oligo says. It adds that an attacker could also show images on something like a smart speaker’s display — as demonstrated with an AirPlay-enabled Bose speaker in the video below — or tap into the speaker’s microphone to listen to nearby conversations.
[Media: https://www.youtube.com/watch?v=vcs5G4JWab8]
Apple has already patched the bugs, but there are still risks via non-Apple-made AirPlay devices. And while there’s a relatively low chance of a hacker being on your home network, Wired points out that AirBorne attacks could also happen if you connect to a public network with an device that uses AirPlay — like a MacBook or an iPhone — that isn’t updated with the latest Apple software.
The risks extend to CarPlay devices, too. Oligo found that attackers “could execute an RCE attack” via CarPlay under certain conditions, like connecting to a car’s Wi-Fi hotspot that’s still using a “default, predictable or known wifi hotspot password.” Once they’re in, hackers could do things like show images on the car’s infotainment system or track the car’s location, according to Oligo.
As Oligo points out, there are tens of millions of third-party AirPlay devices, including things like standalone speakers, home theater systems, TVs. The firm also notes that CarPlay “is widely-used and available in over 800 vehicle models.” According to Wired, Apple created patches for affected third-party devices” as well, but a cybersecurity expert tells the outlet that Apple doesn’t directly control the patching process of third-party devices.
Apple didn’t immediately respond to The Verge’s request for comment.

Russia might be responsible for the PACER hack
- 10 hours ago

Samsung has launched its first Micro RGB TV with improved color accuracy
- 10 hours ago

Sign up and play for free!
- 9 hours ago

Caitlin Clark and 13 more impact WNBA players for playoff (or future) success
- 9 hours ago

The viral video of a ‘deactivated’ Tesla Cybertruck is most likely fake
- 10 hours ago

Perplexity offers to buy Google Chrome for $34.5 billion
- 10 hours ago

Trump’s takeover of the DC police force, briefly explained
- 8 hours ago

We’re hardwired for negativity. That doesn’t mean we’re doomed to it.
- 8 hours ago

Blackwater’s founder would like to sell you a privacy phone made in the USA
- 10 hours ago

At Old-Timers' game, Clemens talks Piazza toss
- 9 hours ago

2K details NBA 2K26 presentation and MyPlayer improvements
- 9 hours ago

The White House has a preferred alternative to PBS. It may already be in countless classrooms.
- 8 hours ago
You May Like
Trending