Follow @EthHackingNews |
Cybersecurity firm Oligo has detailed a set of vulnerabilities its researchers found in Apple s AirPlay protocol and software development kit that could serve as a point of entry to infect other devices on your network, Wired reports. Oligo s researchers refer to the vulnerabilities and attacks they enable as AirBorne. According to Oligo, two of the […]
Cybersecurity firm Oligo has detailed a set of vulnerabilities its researchers found in Apple’s AirPlay protocol and software development kit that could serve as a point of entry to infect other devices on your network, Wired reports.
Oligo’s researchers refer to the vulnerabilities and attacks they enable as “AirBorne.” According to Oligo, two of the bugs it found are “wormable” and could let attackers take over an AirPlay device and spread malware throughout “any local network the infected device connects to.” That said, they would need to already be on the same network as the device to carry out the attack.
Other possible outcomes of an attack include hackers remotely executing code on your devices (also called an RCE attack), accessing local files and sensitive information, and carrying out denial-of-service attacks, Oligo says. It adds that an attacker could also show images on something like a smart speaker’s display as demonstrated with an AirPlay-enabled Bose speaker in the video below or tap into the speaker’s microphone to listen to nearby conversations.