Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24271: An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2025-24271cvecve-2025-24271
Published: Tue Apr 29 2025 (04/29/2025, 02:05:18 UTC)
Source: CVE
Vendor/Project: Apple
Product: iOS and iPadOS

Description

An access issue was addressed with improved access restrictions. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:01:26 UTC

Technical Analysis

CVE-2025-24271 is an access control vulnerability in Apple’s AirPlay implementation across multiple operating systems including iOS, iPadOS, macOS, tvOS, and visionOS. The flaw allows an unauthenticated attacker on the same local network as a signed-in Apple device to send AirPlay commands without the need for device pairing, bypassing normal authentication mechanisms. This is due to insufficient access restrictions in the AirPlay service, classified under CWE-843 (Access of Resource Using Incompatible Type) and CWE-306 (Missing Authentication for Critical Function). The vulnerability enables attackers to potentially manipulate media playback or inject unauthorized commands, impacting the confidentiality and integrity of the device’s media sessions. The CVSS v3.1 base score is 5.4 (medium), reflecting that the attack vector is adjacent network (local network), with low attack complexity, no privileges required, and no user interaction needed. The scope remains unchanged, and the impact affects confidentiality and integrity but not availability. Apple has released patches in iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, and visionOS 2.4 to address this issue by improving access restrictions on AirPlay commands. There are no known exploits in the wild at the time of publication, but the vulnerability could be leveraged in environments where attackers share the same network segment as targeted devices.

Potential Impact

The vulnerability allows unauthorized users on the same network to send AirPlay commands to Apple devices without pairing, potentially enabling attackers to manipulate media playback or inject unauthorized content. This could lead to privacy breaches, as attackers might infer user activity or disrupt user experience. While it does not allow full device compromise or denial of service, the breach of confidentiality and integrity of media sessions can undermine trust in device security. Organizations with Apple devices in shared or public networks (e.g., corporate Wi-Fi, hotels, cafes) are at risk, especially where network segmentation or client isolation is weak. Attackers could use this vector for targeted harassment, social engineering, or as a foothold for further lateral movement if combined with other vulnerabilities. The impact is primarily on end-user devices but could affect enterprise environments relying on Apple hardware for critical communication or presentations.

Mitigation Recommendations

1. Immediately apply the security updates released by Apple for iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, and visionOS 2.4 to ensure the vulnerability is patched. 2. Implement network segmentation and client isolation on Wi-Fi networks to prevent unauthorized devices from communicating directly with Apple devices. 3. Disable AirPlay or restrict AirPlay access to trusted devices and networks where possible, especially in sensitive environments. 4. Monitor network traffic for unusual AirPlay command patterns or unauthorized device connections. 5. Educate users about the risks of connecting to untrusted networks and encourage use of VPNs or secure network environments. 6. For enterprise environments, consider deploying Mobile Device Management (MDM) policies to control AirPlay settings and enforce security configurations. 7. Regularly audit and update device firmware and software to maintain security posture against emerging vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:45.017Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbede4d

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 4/3/2026, 1:01:26 AM

Last updated: 5/9/2026, 3:27:33 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses