Millions of Apple AirPlay devices that are susceptible to ‘airborne’ zero-click RCE attack, then patch now


  • Security researchers found dozens of defects in Apple’s AirPlay protocol
  • Some of them allowed execution attacks with remote code
  • Apple has released patches that address the deficiencies

Apple’s AirPlay Protocol and AirPlay Software Development Kit (SDK) wore several vulnerabilities that could be abused to run Remote Code Execution (RCE) attack, male-in-the-mid (MITM) attack or denial of service (DOS) attacks. To make things worse, some of these vulnerabilities could be used in zero -click -click, which means pulling it off -no interaction from the victim is required.

CyberSecurity scientists oligo security found 23 shortcomings and called them collectively. Two of the deficiencies could be used in RCE attacks, which are now traced as CVE-2025-24252 and CVE-2025-24132. There is also CVE-2025-24206, a user interaction ulcer that allows Crooks to bypass “Accept” click requirements on AirPlay requests.

Leave a Comment

Your email address will not be published. Required fields are marked *