Dark Mode Light Mode

Millions of AirPlay devices can be hacked over Wi-Fi; CarPlay too

Millions of AirPlay devices can be hacked over Wi-Fi; CarPlay too Millions of AirPlay devices can be hacked over Wi-Fi; CarPlay too
Millions of AirPlay devices can be hacked over Wi Fi; CarPlay


vulnerabilities discovered in 's AirPlay SDK mean that millions of devices could be hacked by attackers. The flaw has been dubbed AirBorne.

Related vulnerabilities would also have allowed hackers to attack Apple devices too, but the maker says it has issued fixes for these in the past few months. CarPlay devices are also vulnerable, though the real-life risks there are very low …

AirPlay is the Wi-Fi-based protocol that allows Apple devices like iPhones, iPads, and Macs to wirelessly send audio and video to third-party , audio receiver, set-top boxes, and smart TVs.

Wired reports that a vulnerability in Apple's development kit (SDK) means that tens of millions of those devices could be compromised by an attacker.

On Tuesday, researchers from the cybersecurity firm Oligo revealed what they're calling AirBorne, a collection of vulnerabilities affecting AirPlay, Apple's proprietary radio-based protocol for local wireless communication. Bugs in Apple's AirPlay software development kit (SDK) for third-party devices would allow hackers to hijack gadgets like speakers, receivers, set-top boxes, or smart TVs if they're on the same Wi-Fi network as the hacker's machine […]

Oligo's chief technology officer and cofounder, Gal Elbaz, estimates that potentially vulnerable third-party AirPlay-enabled devices number in the tens of millions. “Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch—or they will never be patched,” Elbaz says. “And it's all because of vulnerabilities in one piece of software that affects everything.”

For consumers, an attacker would first need to gain access to your Wi-Fi network. The risk of this depends on the security of your router: millions of wireless routers also have serious security flaws, but access would be limited to the range of your Wi-Fi.

AirPlay devices on public networks, like those used everywhere from shops to airports, would allow direct access.

The researchers say the worst-case scenario would be an attacker gaining access to the microphones in an AirPlay device, such as those in smart speakers. However, they have not demonstrated this capability, meaning it remains theoretical for now.

The researchers followed standard practice in reporting the issues to Apple and waiting for the company to issue security fixes before disclosing the vulnerabilities. Apple says it has issued patches for all its own devices, as well as making fixes available to the makers of third-party products.

Check out the Wired piece for a proof-of-concept video, in which researchers exploit AirBorne to display their company logo on a Bose speaker.

CarPlay devices are also vulnerable to AirBorne, though in that case an attacker would need to be able to pair their device, making it a far smaller real-life risk.

9to5Mac's Take

The risks here aren't enormous, but it's worth ensuring you install any security updates issued for your AirPlay devices. It's of course always good practice to keep all of your updated.

Highlighted

Image: Oligo

FTC: We use earning auto affiliate links. More.



Source link

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use
Add a comment Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post
MacBook Air vs iPad Pro

You can schedule your Mac to turn off and on — here's how

Next Post
How to do a stimulation fast

How to do a stimulation fast

Discover more from rjema

Subscribe now to keep reading and get access to the full archive.

Continue reading