Apple’s AirPlay Under Attack: AirBorne Flaws Leave Devices Vulnerable!
AirBorne vulnerabilities in Apple’s AirPlay could lead to fully hijacked devices. Just think of it as the wireless version of letting a raccoon loose in your house—chaos everywhere! With zero-click exploits on the horizon, updating your devices might just save you from unwanted digital guests.

Hot Take:
Looks like Apple’s AirPlay just got a new job description: accidental secret agent. With these vulnerabilities, your devices could be auditioning for the next spy thriller, whether you like it or not!
Key Points:
– Oligo Security uncovered serious vulnerabilities in Apple’s AirPlay protocol and SDK, dubbed AirBorne.
– Two critical issues, CVE-2025-24252 and CVE-2025-24132, enable zero-click remote code execution (RCE).
– AirBorne flaws can be exploited to fully hijack devices, spread malware, and conduct espionage or ransomware attacks.
– The vulnerabilities affect a vast number of devices due to AirPlay’s presence in Apple and third-party products.
– Users are advised to update their devices, disable unused AirPlay features, and restrict AirPlay access for safety.