Ars Technica - All content 05月01日 02:46
Millions of Apple Airplay-enabled devices can be hacked via Wi-Fi
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

苹果的AirPlay功能允许用户通过无线方式在不同设备间传输音频、视频和照片。然而,最新发现的AirPlay安全漏洞使黑客能够轻易地在网络中移动,将恶意代码从一个受感染的设备传播到另一个设备。网络安全公司Oligo的研究人员发现了名为AirBorne的一系列漏洞,这些漏洞影响了AirPlay协议,特别是第三方设备中AirPlay软件开发工具包(SDK)。虽然苹果已经修复了其设备上的部分漏洞,但大量第三方设备可能长期面临风险。

📡 AirPlay的安全隐患:AirPlay是一种无线协议,用于在苹果设备和其他支持该协议的设备之间传输内容。Oligo的研究人员发现,AirPlay存在安全漏洞,这些漏洞可能允许黑客通过无线连接入侵设备。

🔨 第三方设备面临的风险:AirPlay的漏洞主要存在于第三方设备的AirPlay SDK中,这些漏洞可能使黑客劫持扬声器、接收器、机顶盒或智能电视等设备,只要它们与黑客的设备在同一Wi-Fi网络中。

🛡️ 苹果已修复部分漏洞:苹果公司已经修复了其设备上的部分AirPlay漏洞,但第三方设备由于更新不及时等原因,可能长期面临安全风险。Oligo的CTO估计,潜在的易受攻击的第三方AirPlay设备数量可能达到数千万。

Apple’s AirPlay feature enables iPhones and MacBooks to seamlessly play music or show photos and videos on other Apple devices or third-party speakers and TVs that integrate the protocol. Now newly uncovered security flaws in AirPlay mean that those same wireless connections could allow hackers to move within a network just as easily, spreading malicious code from one infected device to another. Apple products are known for regularly receiving fixes, but given how rarely some smart-home devices are patched, it’s likely that these wirelessly enabled footholds for malware, across many of the hundreds of models of AirPlay-enabled devices, will persist for years to come.

On Tuesday, researchers from the cybersecurity firm Oligo revealed what they’re calling AirBorne, a collection of vulnerabilities affecting AirPlay, Apple’s proprietary radio-based protocol for local wireless communication. Bugs in Apple’s AirPlay software development kit (SDK) for third-party devices would allow hackers to hijack gadgets like speakers, receivers, set-top boxes, or smart TVs if they’re on the same Wi-Fi network as the hacker’s machine. Another set of AirBorne vulnerabilities would have allowed hackers to exploit AirPlay-enabled Apple devices too, Apple told Oligo, though these bugs have been patched in updates over the last several months, and Apple tells WIRED that those bugs could have only been exploited when users changed default AirPlay settings.

Those Apple devices aside, Oligo’s chief technology officer and cofounder, Gal Elbaz, estimates that potentially vulnerable third-party AirPlay-enabled devices number in the tens of millions. “Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch—or they will never be patched,” Elbaz says. “And it's all because of vulnerabilities in one piece of software that affects everything.”

Read full article

Comments

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

AirPlay 安全漏洞 无线协议 黑客攻击 第三方设备
相关文章