Millions of Apple AirPlay devices susceptible to RCE RCE of zero click ‘attacks in the air’, so patch now




  • Security researchers found dozens of failures in the Apple AirPlay protocol
  • Some of them allowed remote code execution attacks
  • Apple has launched patches that address defects

The Apple AirPlay protocol and the AirPlay Software Development Kit (SDK) carried numerous vulnerabilities that could be abused to execute remote code execution attacks (RCE), man attacks in the middle (MITM) or service denial attacks (two). To make things worse, some of these vulnerabilities could be used in click attacks, which means achieving it, the victim’s interaction is not required.

Cybersecurity researchers Oligo Security found 23 defects and collectively called them in the air. Two of the defects could be used in RCE attacks, which are now traced as CVE-2025-24252 and CVE-2025-24132. There are also CVE-2025-24206, a vulnerability to omit user interaction that allows criminals overlooking the click requirements “accept” in AirPlay applications.

Leave a Comment

Your email address will not be published. Required fields are marked *