Failles critiques trouvées dans AirPlay, ça concerne potentiellement aussi des produits d'autres fabricants qui utilisent le SDK d'Apple :
https://www.oligo.security/blog/airborne
Oligo Security Research has discovered a new set of vulnerabilities in Apple’s AirPlay Protocol and the AirPlay Software Development Kit (SDK), which is used by third-party vendors to integrate AirPlay into third-party devices.
The vulnerabilities enable an array of attack vectors and outcomes, including:- Zero-Click RCE
- One-Click RCE
- Access control list (ACL) and user interaction bypass
- Local Arbitrary File Read
- Sensitive information disclosure
- Man-in-the-middle (MITM) attacks
- Denial of service (DoS)
These vulnerabilities can be chained by attackers to potentially take control of devices that support AirPlay – including both Apple devices and third-party devices that leverage the AirPlay SDK.
The vulnerabilities and the attack vectors they enable have been named “AirBorne” by Oligo Security researchers, as the attacks that they make possible are transmitted via wireless networks or peer–to-peer connections, and allow attackers to fully take over devices and use that access as a launchpad for further exploitation.