Cybersecurity researchers have disclosed a collection of now-patched safety vulnerabilities in Apple’s AirPlay protocol that, if efficiently exploited, might allow an attacker to take over prone gadgets supporting the proprietary wi-fi know-how.
The shortcomings have been collectively codenamed AirBorne by Israeli cybersecurity firm Oligo.
“These vulnerabilities may be chained by attackers to doubtlessly take management of gadgets that help AirPlay – together with each Apple gadgets and third-party gadgets that leverage the AirPlay SDK,” safety researchers Uri Katz, Avi Lumelsky, and Gal Elbaz stated.
Some of the vulnerabilities, like CVE-2025-24252 and CVE-2025-24132, may be strung collectively to trend a wormable zero-click RCE exploit, enabling dangerous actors to deploy malware that propagates to gadgets on any native community the contaminated gadget connects to.
This might then pave the way in which for stylish assaults that may result in the deployment of backdoors and ransomware, posing a critical safety threat.
The vulnerabilities, in a nutshell, might allow zero- or one-click distant code execution (RCE), entry management checklist (ACL) and person interplay bypass, native arbitrary file learn, data disclosure, adversary-in-the-middle (AitM) assaults, and denial-of-service (DoS).
This contains chaining CVE-2025-24252 and CVE-2025-24206 to attain a zero-click RCE on macOS gadgets which are linked to the identical community as an attacker. However, for this exploit to succeed, the AirPlay receiver must be on and set to the “Anyone on the identical community” or “Everyone” configuration.
In a hypothetical assault state of affairs, a sufferer’s gadget might get compromised when linked to a public Wi-Fi community. Should the gadget be linked later to an enterprise community, it might present an attacker with a solution to breach different gadgets which are linked to the identical community.
Some of the opposite notable flaws are listed beneath –
- CVE-2025-24271 – An ACL vulnerability that may allow an attacker on the identical community as a signed-in Mac to ship AirPlay instructions to it with out pairing
- CVE-2025-24137 – A vulnerability that might trigger arbitrary code execution or an software to terminate
- CVE-2025-24132 – A stack-based buffer overflow vulnerability that might end in a zero-click RCE on audio system and receivers that leverage the AirPlay SDK
- CVE-2025-24206 – An authentication vulnerability that might enable an attacker on the native community to bypass authentication coverage
- CVE-2025-24270 – A vulnerability that might enable an attacker on the native community to leak delicate person data
- CVE-2025-24251 – A vulnerability that might enable an attacker on the native community to trigger an surprising app termination
- CVE-2025-31197 – A vulnerability that might enable an attacker on the native community to trigger an surprising app termination
- CVE-2025-30445 – A kind confusion vulnerability that might might enable an attacker on the native community to trigger an surprising app termination
- CVE-2025-31203 – An integer overflow vulnerability that might enable an attacker on the native community to trigger a DoS situation
Following accountable disclosure, the recognized vulnerabilities have been patched within the beneath variations –
- iOS 18.4 and iPadOS 18.4
- iPadOS 17.7.6
- macOS Sequoia 15.4
- macOS Sonoma 14.7.5
- macOS Ventura 13.7.5
- tvOS 18.4, and
- visionOS 2.4
Some of the weaknesses (CVE-2025-24132 and CVE-2025-30422) have additionally been patched in AirPlay audio SDK 2.7.1, AirPlay video SDK 3.6.0.126, and CarPlay Communication Plug-in R18.1.
“For organizations, it’s crucial that any company Apple gadgets and different machines that help AirPlay are up to date instantly to the most recent software program variations,” Oligo stated.
“Security leaders additionally want to offer clear communication to their staff that every one of their private gadgets that help AirPlay must even be up to date instantly.”