Oligo Discovers Vulnerabilities in Apple’s AirPlay Protocol
A recent report by Wired has revealed that cybersecurity firm Oligo has identified a series of vulnerabilities in Apple’s AirPlay protocol and software development kit. These vulnerabilities could potentially be exploited by malicious actors to infiltrate other devices on the same network.
The “AirBorne” Vulnerabilities
Oligo’s researchers have coined the term “AirBorne” to describe the vulnerabilities and possible attacks they enable. Two of the identified bugs are classified as “wormable,” meaning that they could allow attackers to seize control of an AirPlay device and propagate malware across any local network that the infected device connects to. However, it’s important to note that the attacker would need to already be present on the same network as the device to carry out the attack.
Potential Consequences of an Attack
According to Oligo, the outcomes of an attack could range from remote code execution (RCE) on targeted devices to unauthorized access to sensitive information and local files. Attackers could also conduct denial-of-service attacks or even manipulate devices like smart speakers, as demonstrated with an AirPlay-enabled Bose speaker in a video. Additionally, attackers could potentially tap into a speaker’s microphone to eavesdrop on nearby conversations.
Apple’s Response and Continued Risks
While Apple has released patches to address the identified vulnerabilities, there are still risks associated with non-Apple AirPlay devices. Wired highlights the potential for AirBorne attacks to occur when connecting to public networks with devices like MacBooks or iPhones that have not been updated with the latest Apple software.
Furthermore, Oligo’s research extends to CarPlay devices, where attackers could exploit vulnerabilities to execute RCE attacks under specific conditions. By connecting to a car’s Wi-Fi hotspot with a default or predictable password, hackers could potentially display images on the car’s infotainment system or track its location.
Widespread Impact and Patching Challenges
Oligo emphasizes the widespread adoption of third-party AirPlay devices, including speakers, home theater systems, and TVs, as well as the prevalence of CarPlay in over 800 vehicle models. While Apple has issued patches for affected third-party devices, the firm acknowledges that Apple does not directly control the patching process for these devices.
Conclusion
As the cybersecurity landscape continues to evolve, it’s crucial for users to stay vigilant and ensure that their devices are updated with the latest security patches. While Apple has taken steps to address the vulnerabilities in its AirPlay protocol, the potential risks associated with non-Apple devices underscore the importance of maintaining a secure network environment.