Summary
CVE-2025-24252 is part of “AirBorne”, a critical zero-click vulnerability in Apple’s AirPlay protocol enabling unauthenticated remote code execution (RCE) on over 2.35 billion Apple and tens of millions of third-party devices via Wi-Fi without user interaction.
Impacted Versions
- Apple OS:
- iOS 18.4 and iPadOS 18.4 (fixed in 18.4) [6]
- macOS Ventura 13.7.5, Sonoma 14.7.5 and Sequoia 15.4 (fixed in those releases) [7]
- visionOS 2.4 (fixed in 2.4) [7]
- AirPlay SDK (third-party devices):
- Audio SDK 2.7.1, Video SDK 3.6.0.126, CarPlay Plug-in updates [1]
Vulnerabilities
- CVE-2025-24252 + CVE-2025-24206 (Use-After-Free & Auth Bypass)
- Severity: Critical
- A use-after-free in AirPlay receiver plus an authentication bypass enables zero-click RCE on devices set to “Anyone on the same network” [1][4].
- CVE-2025-24132 (Stack-Based Buffer Overflow)
- Severity: Critical
- An overflow in the AirPlay SDK affecting speakers, TVs and CarPlay systems allows wormable exploits [1][4].
- CVE-2025-24271 (ACL Bypass)
- Severity: Critical
- Improper access-control handling lets attackers send unauthenticated AirPlay commands, weaponisable for RCE [1][4].
Exploitation & Threat
Attackers on the same Wi-Fi network can send malformed plist or RTSP commands (e.g. /setProperty
, SETUP
) to crash AirPlay services, corrupt memory and achieve code execution in background processes (e.g. ControlCenter, WindowServer) [1]. Demonstrations include hijacking a Mac’s Music app or a Bose speaker to display images and play audio; buffer-overflow chaining enables self-propagation across devices [2][3][4]. Public hotspots and corporate Wi-Fi are prime targets for mass exploitation, lateral movement, espionage or ransomware staging [2].
Mitigations
- Patch Immediately: Apply Apple’s updates for iOS 18.4, iPadOS 18.4, macOS Ventura 13.7.5, Sonoma 14.7.5, Sequoia 15.4 and visionOS 2.4 [6][7].
- Disable AirPlay Receiver: Turn off AirPlay on devices not in active use [1].
- Network Hardening: Restrict port 7000 (AirPlay) via firewalls; limit AirPlay traffic to trusted endpoints [1].
- Third-Party Coordination: Contact device manufacturers for SDK firmware updates; verify that Audio 2.7.1/Video 3.6.0.126/CarPlay Plug-in patches are applied [1].
- Monitoring & Detection: Audit network logs for unusual
/setProperty
orSETUP
requests; deploy IDS/IPS signatures and Nuclei templates for AirBorne indicators [4].
Resources and Further Reading
- Cybersecurity News: AirPlay Zero-Click RCE Vulnerability
- The Verge: AirPlay security flaws could help hackers spread malware
- Wired: Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi
- Oligo Security: Critical Vulnerabilities in AirPlay Protocol
- BleepingComputer: Apple ‘AirBorne’ zero-click AirPlay RCE attacks
- Apple Support: About the security content of iOS 18.4 and iPadOS 18.4
- Apple Support: Apple security releases
- TheHackerNews: Apple backports critical fixes for 3 recent 0-days
- Forbes: iOS 18.4.1—Apple Issues Update Now Warning To All iPhone Users
- Apple Support: About the security content of iOS 18.4.1 and iPadOS 18.4.1