Apple users worldwide are being urged to immediately update their devices and disable the AirPlay feature, following the discovery of a critical vulnerability dubbed “AirBorne.” Security researchers warn that the flaw could enable zero-click attacks, exposing millions of devices and smart home networks to remote hijacking and data theft.
Zero-Click Exploit Targets AirPlay, Compromises Entire Smart Ecosystems
Apple has issued an urgent advisory to millions of iPhone users to update their devices and disable AirPlay, after cybersecurity researchers at Tel Aviv-based firm Oligo exposed a set of 23 critical vulnerabilities affecting the AirPlay protocol and its Software Development Kit (SDK). The flaw, now known as the “AirBorne” vulnerability, allows hackers to remotely exploit iPhones and other AirPlay-compatible devices over Wi-Fi networks—without any user interaction.
AirPlay, designed to stream audio and video from iPhones to smart TVs and other compatible devices, has become a staple in Apple’s ecosystem. However, its extensive integration with third-party products—many of which may never receive security updates—has opened a massive attack surface.
“These are zero-click vulnerabilities,” warned Oligo CTO Gal Elbaz, meaning that once a device is on the same Wi-Fi network as an attacker, it can be compromised without the user opening a link, downloading a file, or even touching the screen. The potential impact ranges from remote code execution to silent data theft across household or enterprise environments.
Millions at Risk: Why This Attack is Harder to Fix Than It Seems
What makes AirBorne uniquely dangerous is its deep embedding across Apple’s ecosystem and third-party devices. From living room TVs and smart speakers to enterprise conference systems, AirPlay’s SDK is widely used. But many of these devices, especially older or cheaper third-party products, either lack update mechanisms or receive patches years late—if at all.
“This is not just a phone problem,” Elbaz explained. “You’re essentially giving hackers a remote control for your entire connected home or office if you’re using unpatched devices.”
Among the 23 vulnerabilities discovered, several allow memory corruption, buffer overflows, and unauthorized system-level access. Once breached, hackers could implant malware, intercept data streams, or create botnets of compromised AirPlay devices.
While Apple has issued a fix for iPhones through a security update, the patches may not protect the broader ecosystem, especially non-Apple AirPlay receivers, creating a long-term vector for abuse.
ALSO READ: FCRF Launches Campus Ambassador Program to Empower India’s Next-Gen Cyber Defenders
How to Stay Safe: Immediate Actions for iPhone Users
In its advisory, Apple has instructed users to take immediate steps to protect their devices:
- Update to the latest version of iOS via Settings > General > Software Update.
- Disable AirPlay Receivers by going to Settings > General > AirPlay & Handoff > AirPlay Receiver, and either turning it off or setting it to ‘Current User’ only.
- Use reputable mobile security software to detect any suspicious background activity or network behavior.
- Limit connection to public or untrusted Wi-Fi networks, especially in shared office or hotel environments.
This marks the second major Apple security scare in recent months. In February, the company disclosed that USB Restricted Mode, a feature meant to block data transfer from locked iPhones, may have been bypassed in what Apple called an “extremely sophisticated targeted attack.”
Security researchers emphasize that these incidents reflect a broader trend: as smartphones become the central hub of digital life, they’re increasingly the entry point for multi-device attacks.