Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi

In the following you will find a video of the oligo researchers who demonstrate their hacking technology in the air to take over an AirPlay-capable Bose spokesman to show your company’s logo for the air. (The researchers said they did not want to go out the bose, but happened to have one of the company’s spokesman for testing.) Bose did not immediately respond to the request from WIRED for a comment.

The weaknesses found in the air, which Oligo found, also affects the CarPlay, the Radio protocol to connect to the fittings of the vehicles. Oligo warns that this means that hackers could kidnap the automotive computer of a car in one of more than 800 car player-enabled car and truck models. In these automatic cases, however, the weak points in the air could only be used if the hacker is able to combine its own device with the head unit via Bluetooth or a USB connection that drastically restricts the threat from car play-based vehicle hacking.

The AirPlay -SDK errors in home media devices can be a more practical susceptibility to hackers who want to hide in a network whether ransomware is installed or secret spy is carried out, while they are often forgotten on devices that are often forgotten by consumers and company or government network defenders. “The number of devices that were susceptible to these problems is what worries me,” says Oligo researcher Uri Katz. “When was the last time you updated your speaker?”

The researchers originally started over this property of AirPlay and finally discovered the weaknesses in the air, while they were analyzed on another project that enabled an attacker to access internal services that are executed by a malicious website on the local network of a target by a malicious website. In these previous studies, Oligos Hacker found that they were able to defeat the basic protective measures in every web browser that is intended to prevent websites from having this kind of invasive access to other people’s internal networks.

When the researchers played around with their discovery, the researchers found that one of the services they were able to take advantage of on the mistakes of the target without the goal of the goal was AirPlay. The previously unveiled crop of the weaknesses in the air is not connected to the previous work, but was inspired by AirPlay’s real estate as a service in order to be open and ready for new connections.

And the fact that the researchers found mistakes in the AirPlay SDK means that weak points lurk in hundreds of devices – and possibly more, since some manufacturers include the AirPlay SDK without notifying Apple and becoming “certified” airplay devices.

“When manufacturers of third-party providers integrate Apple technologies such as AirPlay via an SDK, Apple obviously no longer has direct control over the hardware or the patching process,” says Patrick Wardle, CEO of the Apple equipment security company Doubleyou. “If providers occur and third-party providers are not immediately or not at all-the users are not only exposed to the risk, but can also undermine confidence in the wider Apple ecosystem.”

Updates 10 a.m. ET, April 29, 2024: explained that the logo in Oligo’s video is for the air and not for the company itself.

Leave a Reply

Your email address will not be published. Required fields are marked *