Airborne Flaws Can Lead to Fully Hijack Apple Devices

A recent discovery by Oligo Security has exposed serious vulnerabilities in Apple's AirPlay protocol and SDK, leaving a vast array of devices open to attacks. These critical flaws, collectively tracked as "AirBorne," can be exploited to perform zero-click remote code execution, bypass access control lists (ACLs), read local files, steal data, and execute man-in-the-middle (MITM) or denial-of-service (DoS) attacks.

The researchers found that two specific issues, CVE-2025-24252 and CVE-2025-24132, enable wormable zero-click remote code execution, allowing attackers to hijack AirPlay-enabled devices and spread malware across local networks. This poses significant risks of espionage, ransomware, and supply-chain attacks, with far-reaching implications due to the widespread presence of AirPlay in Apple and third-party devices.

"Oligo has demonstrated that two of the vulnerabilities (CVE-2025-24252 and CVE-2025-24132) allow attackers to weaponize wormable zero-click RCE exploits," reads the report published by Oligo Security. "This means that an attacker can take over certain AirPlay-enabled devices and do things like deploy malware that spreads to devices on any local network the infected device connects to."

These vulnerabilities are particularly concerning because they can be chained together to fully hijack devices over wireless or peer-to-peer connections. While not all Apple devices are affected, the sheer number of active devices globally – 2.35 billion, including 100+ million Macs and tens of millions of AirPlay-enabled third-party devices – means that the potential impact is vast.

CVE-2025-24252 is a critical use-after-free vulnerability in macOS, allowing a remote attacker to execute arbitrary code. When combined with CVE-2025-24206, it enables zero-click, wormable attacks on devices with AirPlay enabled on open network settings. Attackers can exploit this to spread malware across networks without user interaction, even via public WiFi.

CVE-2025-24132 is a stack-based buffer overflow flaw in the AirPlay SDK, enabling zero-click, wormable remote code execution on all supported speakers and receivers. Exploits can spread without user interaction, leading to outcomes from playing media to serious intrusions like eavesdropping via device microphones in sensitive environments.

Oligo reported 23 vulnerabilities to Apple, and 17 CVEs were issued. The company collaborated with Apple to identify and patch the issues, releasing updates and following responsible disclosure practices.

Reducing Risk: Tips for Users

To reduce the risk of being affected by these AirBorne vulnerabilities, users should take the following steps:

  • Update devices immediately to the latest software versions.
  • Disable AirPlay Receiver if unused.
  • Restrict AirPlay access via firewall (port 7000).
  • Set "Allow AirPlay for" to "Current User" to limit exposure.

"For organizations, it is imperative that any corporate Apple devices and other machines that support AirPlay are updated immediately to the latest software versions. Security leaders also need to provide clear communication to their employees that all of their personal devices that support AirPlay need to also be updated immediately," concludes the report.

Stay informed about the latest security updates and threats by following us on Twitter (@securityaffairs), Facebook, and Mastodon (SecurityAffairs – hacking, Apple's AirPlay, AirBorne).