Trending

AirPlay security flaws could help hackers spread malware on your network

Cyber ​​Security Company Oligo has Detailed set of weaknesses Her researchers have found in the Apple broadcasting protocol and the software development group that could serve as an entry point for the injury of other devices on your network, Wireless Reports.

Oligo researchers refer to the weaknesses and attacks that they allow “air portable”. According to Oligo, two of the mistakes he found are “worm can” and may allow attackers to seize the AirPlay and spread malware throughout “any local network that the affected device connects to. However, they will need to be already on the same network as the device to carry out the attack.

Other possible results of the attack include that infiltrators are implemented on your devices (also called the RCE attack), access to local files and sensitive information, and the implementation of service refusal attacks, says Oligo. He adds that the attacker can also display pictures on something like a smart speaker display-as shown with the Bose amplifier that supports the air in the video below-or take advantage of the headphone microphone to listen to nearby conversations.

Apple has already corrected errors, but there are still risks across AirPlay devices that are not made from the application. Although there is a relatively low opportunity to have an infiltrator on your home network, Wireless It indicates that air portable attacks may also occur if you connect to a public network with an AirPlay device – such as a MacBook or iPhone – is not updated with the latest Apple.

The risks extend to CarPlay devices as well. Oligo found that the attackers “can carry out the RCE attack” via CarPlay under certain circumstances, such as connecting to the car’s Wi-Fi connection point that is still using the “Virtual, known or known” WiFi password. ” Once they enter, the infiltrators can do things like showing pictures on the car’s information and entertainment system or tracking the car site, according to Oligo.

As OLIGO indicates, there are tens of millions of AirPlay devices by third -party, including things such as independent speakers, home theater systems and televisions. The company also notes that CarPlay “is widely used and available in more than 800 vehicle styles.” according to Wireless, Apple has created corrections for the affected third party devices, “but the cybersecurity expert tells the port that Apple does not directly control the process of correcting third -party devices.

Apple did not respond immediately Drilling Request to comment.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button