Hackers can use AirPlay to hijack smart homes and spy on users

Written by

Published 30 Apr 2025

Fact checked by

We maintain a strict editorial policy dedicated to factual accuracy, relevance, and impartiality. Our content is written and edited by top industry professionals with first-hand experience. The content undergoes thorough review by experienced editors to guarantee and adherence to the highest standards of reporting and publishing.

Disclosure

에어플레이란? 그것이 무엇이며 어떻게 사용합니까?

Critical security flaws in Apple’s AirPlay technology allow hackers to take control of smart speakers, TVs, and car systems without passwords. These vulnerabilities, named “AirBorne,” affect billions of devices worldwide and might never be fixed on many third-party products.

Security firm Oligo Security found 23 vulnerabilities in Apple’s AirPlay protocol and software development kit. Two of these flaws allow hackers to create “zero-click” attacks that spread malware across networks without requiring user interaction. Apple released a patch for its own devices in March, but millions of third-party products may never get updates.

    “Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch—or they will never be patched,” warns Gal Elbaz, Oligo Security’s Chief Technology Officer.

    The attack works when hackers join the same Wi-Fi network as their targets. Public Wi-Fi spots in airports and cafes are prime locations for exploitation. This limitation, however, doesn’t diminish the threat to home networks with weak security.

    AirBorne affects over 2.35 billion Apple devices and tens of millions of third-party products with AirPlay. “This means that an attacker can take over certain AirPlay-enabled devices and do things like deploy malware that spreads to devices on any local network the infected device connects to. This could lead to the delivery of other sophisticated attacks related to espionage, ransomware, supply-chain attacks, and more,” Oligo explained.

    The most concerning vulnerabilities include CVE-2025-24252, a bug in macOS that allows remote code execution, and CVE-2025-24132, a flaw affecting third-party speakers and CarPlay systems.

    For CarPlay-enabled vehicles, attacks are harder. Hackers need physical proximity through Bluetooth or weak Wi-Fi passwords. If successful, they could track vehicle locations or distract drivers with unexpected sounds or images.

    Security experts suggest several ways to stay safe. Users should update all Apple devices immediately and disable the AirPlay receiver when not in use. Network administrators can limit AirPlay access through firewall rules that restrict port 7000 to trusted devices only.

    The widespread integration of AirPlay into everyday devices creates an enduring security challenge. Many older smart home devices lack regular updates, leaving them permanently vulnerable to these new attack methods.

    This discovery highlights growing concerns about Internet of Things security, where connected devices with varying update cycles create long-term vulnerabilities that last long after fixes become available.