Millions of Apple AirPlay can be penetrated via Wi-Fi

Photo of author

By [email protected]


AUBLAY Apple feature allows iphone and Macbox To play music, display photos and videos on other Apple devices, loudspeakers and televisions that merge the protocol. Now the newly discovered security disadvantages in AirPlay means that these wireless connections can allow infiltrators to move within a network of ease, as it publishes harmful programming instructions from one infected device to another. Apple products are regularly famous for repairs, but because some smart devices are rarely corrected for the home, this is likely to continue with a wireless succulent foothold for harmful programs, through many hundreds of models that support air, for years to come.

On Tuesday, researchers from the Cyber ​​Security Company, Oligo, revealed what they call Airbore, a group of weaknesses that affect AirPlay, a protocol from Apple -based radio for local wireless communications. The errors in the APPLE (SDK) (SDK) software will allow the infiltrators to kidnap tools such as speakers, receptions, executing boxes, or smart TVs if it is on the same Wi-Fi network as the Hacker. Apple Oligo has told another group of air -portable weaknesses for infiltrators to exploit APLAY AIPLAY devices as well, although these errors have been corrected in updates over the past few months, and tells Apple Wire that these errors could only be used when users changed virtual broadcasting settings.

These Apple devices aside, the chief technology employees in Oligo and the founder of Gal Elbaz estimated that the number of devices that are likely to be third -party that supports air in tens of millions. “Since AirPlay is supported in a wide range of devices, there is a lot that will take years so that they are never corrected,” says Elbaz. “All this is due to the weaknesses of one program that affects everything.”

Although OLIGO that works with Apple for several months to correct air mobile errors in all affected devices, the TEL-AAVID security company warns that air vulnerability is air in many third-party tools that are likely to be hacked unless users do not act to update. If the infiltrator can access the Wi-Fi itself like these weak devices-by penetrating another computer on the home or company network or simply by connecting to the same coffee or Wi-Fi-it can take these tools. From there, they can use this control to maintain the hidden access point, penetrate other goals on the network, or add machines to a robot of affected coordinated machines under the control of the infiltrator.

Oligo also notes that many weak devices contain microphones and can be converted into spy listening devices. The researchers have not even gone to create harmful programs for the understanding of any specific goal that would explain that trick.

Oligo says it has warned Apple of its air -mobile results in late autumn and winter last year, and Apple has responded in the months since then by paying security updates. Researchers cooperated with Apple to test and check MACS repairs and other Apple products.

Apple Wire tells that she has also created corrections available for affected third -party devices. Nevertheless, the company emphasizes the presence of restrictions on the attacks that will be possible on the devices that support broadcasts as a result of errors, because the attacker should be on the same Wi-Fi network as a goal to exploit. Apple adds that although some user data is on devices such as TV and amplifiers, they are usually very limited.



https://media.wired.com/photos/680bfb50851c144df44b3519/191:100/w_1280,c_limit/airplay-malware-gear-1391670285.jpg

Source link

Leave a Comment