
Certain Apple AirPlay-supported devices have been found vulnerable to potential hacking attempts.
On Wednesday, Ars Technica, referencing a WIRED report, revealed that cybersecurity firm Oligo uncovered a security flaw AirBorne in Apple’s AirPlay functionality.
This vulnerability could allow hackers to hijack AirPlay devices on shared Wi-Fi networks and distribute malicious software. While Apple has issued patches for some affected devices, users who have modified their default AirPlay settings may still be at risk.
Once connected to the same Wi-Fi network, hackers could potentially seize control of speakers, smart TVs, and set-top boxes, even repurposing them as eavesdropping tools. Oligo demonstrated this threat by releasing a video showcasing a live hack, proving that certain devices were susceptible to malware injection without user consent.
Apple has acknowledged the issue and is collaborating with third-party manufacturers to roll out security updates. However, Oligo researchers caution that hundreds of devices utilizing Apple’s AirPlay Software Development Kit (SDK) might be vulnerable. The situation is further complicated by some manufacturers using the SDK without Apple’s official certification, potentially leading to delays in crucial security updates.
Experts advise users to prioritize the security of their smart devices and avoid connecting to suspicious networks until manufacturers release the latest firmware updates.