Technophile NewsTechnophile News
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
What's On

Vivo 30 Pro Mini With 6.31-Inch Display to Launch Later This Month Alongside Vivo S30

9 May 2025

A Visit to the ‘Best Bike Shop in the World’

9 May 2025

Amazon now sells prescription pet pills

9 May 2025

Threads Begins Testing Video Ads to Help Businesses Expand Reach, Increase Audience Engagement

9 May 2025

Influencer Burnout Is on the Rise. A New Mental Health Service Wants to Help

9 May 2025
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact Us
Friday, May 9
Facebook X (Twitter) Instagram YouTube
Technophile NewsTechnophile News
Demo
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
Technophile NewsTechnophile News
Home » Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi
News

Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi

By News Room29 April 20253 Mins Read
Facebook Twitter Pinterest LinkedIn Telegram Tumblr Reddit WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Email

Below is a video of the Oligo researchers demonstrating their AirBorne hacking technique to take over an AirPlay-enabled Bose speaker to show their company’s logo for AirBorne. (The researchers say they didn’t intend to single out Bose, but just happened to have one of the company’s speakers on hand for testing.) Bose did not immediately respond to WIRED’s request for comment.

The AirBorne vulnerabilities Oligo found also affect CarPlay, the radio protocol used to connect to vehicles’ dashboard interfaces. Oligo warns that this means hackers could hijack a car’s automotive computer, known as its head unit, in any of more than 800 CarPlay-enabled car and truck models. In those car-specific cases, though, the AirBorne vulnerabilities could only be exploited if the hacker is able to pair their own device with the head unit via Bluetooth or a USB connection, which drastically restricts the threat of CarPlay-based vehicle hacking.

The AirPlay SDK flaws in home media devices, by contrast, may present a more practical vulnerability for hackers seeking to hide on a network, whether to install ransomware or carry out stealthy espionage, all while hiding on devices that are often forgotten by both consumers and corporate or government network defenders. “The amount of devices that were vulnerable to these issues, that’s what alarms me,” says Oligo researcher Uri Katz. “When was the last time you updated your speaker?”

The researchers originally started thinking about this property of AirPlay, and ultimately discovered the AirBorne vulnerabilities, while working on a different project analyzing vulnerabilities that could allow an attacker to access internal services running on a target’s local network from a malicious website. In that earlier research, Oligo’s hackers found they could defeat the fundamental protections baked into every web browser that are meant to prevent websites from having this type of invasive access on other people’s internal networks.

While playing around with their discovery, the researchers realized that one of the services they could access by exploiting the bugs without authorization on a target’s systems was AirPlay. The crop of AirBorne vulnerabilities revealed today is unconnected to the previous work, but was inspired by AirPlay’s properties as a service built to sit open and at the ready for new connections.

And the fact that the researchers found flaws in the AirPlay SDK means that vulnerabilities are lurking in hundreds of models of devices—and possibly more, given that some manufacturers incorporate the AirPlay SDK without notifying Apple and becoming “certified” AirPlay devices.

“When third-party manufacturers integrate Apple technologies like AirPlay via an SDK, obviously Apple no longer has direct control over the hardware or the patching process,” says Patrick Wardle, CEO of the Apple device-focused security firm DoubleYou. “As a result, when vulnerabilities arise and third-party vendors fail to update their products promptly—or at all—it not only puts users at risk but could also erode trust in the broader Apple ecosystem.”

Updated 10 am ET, April 29, 2024: Clarified that the logo in Oligo’s video is for AirBorne, not the company itself.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related News

A Visit to the ‘Best Bike Shop in the World’

9 May 2025

Amazon now sells prescription pet pills

9 May 2025

Influencer Burnout Is on the Rise. A New Mental Health Service Wants to Help

9 May 2025

Threads adds dashboard to better explain post and account restrictions

9 May 2025

Pope Leo XIV is the first pope with an online footprint

9 May 2025

Congress pulls funding for free Wi-Fi hotspots at schools and libraries

8 May 2025
Top Articles

The Best Laptop Backpacks for Work (and Life)

13 February 202517 Views

The Best Cooling Sheets for Hot Sleepers

30 March 202515 Views

Honor Power Smartphone Set to Launch on April 15; Tipped to Get 7,800mAh Battery

8 April 202514 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss

Threads adds dashboard to better explain post and account restrictions

9 May 2025

Threads is getting a new transparency feature that allows users to see how their accounts…

Google Reveals How It Is Using AI to Combat Online Scams in Search, Chrome and Android

9 May 2025

Apple Silicon Chips for Upcoming Mac Models, AI Servers Reportedly in Development

9 May 2025

Oppo Reno 14, Reno 14 Pro Design Teased Again; RAM and Storage Options Revealed

9 May 2025
Technophile News
Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Technophile News. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.