Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance

Posted on September 11, 2025September 11, 2025 By CWS

Researchers have disclosed particulars of a distant CarPlay hack that may permit attackers to spy on drivers or distract them. 

Runtime software safety agency Oligo earlier this yr revealed that its researchers had found doubtlessly severe vulnerabilities in Apple’s AirPlay wi-fi communication protocol and the accompanying SDK, warning that they may permit hackers to remotely take over gadgets.

AirPlay is utilized by Apple merchandise, however the tech large has additionally licensed its use to different distributors, which have carried out it in TVs, audio programs, and streaming gadgets.

Oligo famous on the time that the vulnerabilities, collectively tracked as AirBorne, may very well be exploited for distant code execution, safety bypass, data disclosure, DoS assaults, and MitM assaults. 

One of many flaws, tracked as CVE-2025-24132, permits attackers to create wormable zero-click distant code execution exploits that allow them to make use of compromised gadgets as a launchpad for extra assaults.

Oligo talked about on the time that an assault is also launched in opposition to CarPlay programs, with none consumer interplay. The corporate has now shared extra particulars on CarPlay — particularly Apple CarPlay — assaults.

The cybersecurity agency defined that an attacker might conduct wired assaults by connecting to the focused CarPlay system by way of USB. Nevertheless, wi-fi assaults are additionally doable, together with over Wi-Fi, which leverages the truth that many distributors use default Wi-Fi passwords.

Wi-fi assaults will also be performed over Bluetooth. The attacker can pair with the focused CarPlay system over Bluetooth so long as they’re in vary. If PIN pairing is enabled, the attacker will possible see the required 4-digit PIN on the display screen of the automobile’s infotainment system. In some circumstances so-called ‘simply works’ pairing is enabled, which permits the attacker to simply connect with the system with none consumer interplay.Commercial. Scroll to proceed studying.

The assault targets the iAP2 protocol utilized by CarPlay to determine a wi-fi connection. iAP2 makes use of one-way authentication, the place the cellphone authenticates the car’s head unit, however the head unit doesn’t authenticate the cellphone. 

“Put plainly, the automobile checks that it’s speaking to a official gadget, however the gadget will settle for any consumer that speaks iAP2. Which means an attacker with a Bluetooth radio and a suitable iAP2 consumer can impersonate an iPhone, request the Wi-Fi credentials, set off app launches and challenge any iAP2 command,” Oligo defined. 

As soon as the hacker has accomplished the Bluetooth pairing course of, they’ll authenticate by way of iAP2, acquire WiFi credentials, and connect with the automobile hotspot. From there they’ll exploit the beforehand talked about AirPlay SDK vulnerability (CVE-2025-24132) to realize distant code execution with root privileges. 

The attacker can then take over the display screen and show photographs or play audio to distract the motive force. The attacker might additionally snoop on conversations or monitor the car’s location.

Apple patched CVE-2025-24132 in late April, however only some distributors have built-in the patch into their merchandise and Oligo will not be conscious of any automobile producer making use of the patch, which is why it has not made public full technical particulars. 

“Even after Apple launched a patched SDK, every automaker should adapt, take a look at, and validate it for their very own programs – coordinating throughout head-unit suppliers, inside software program groups, and typically middleware suppliers. Every step introduces potential delays and requires strong collaboration,” Oligo defined.

“The result’s an extended tail of publicity,” it added. “Whereas high-end fashions with strong OTA pipelines could also be patched rapidly, many others take months, years, or by no means obtain the replace in any respect. That leaves hundreds of thousands of autos doubtlessly uncovered – lengthy after an ‘official’ repair exists.”

Associated: Jaguar Land Rover Admits Information Breach Attributable to Current Cyberattack

Associated: Free Wi-Fi Leaves Buses Weak to Distant Hacking

Associated: Flaws in Main Automaker’s Dealership Programs Allowed Automotive Hacking, Private Information Theft

Security Week News Tags:CarPlay, Distraction, Drivers, Hack, Puts, Remote, Risk, Surveillance

Post navigation

Previous Post: NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges
Next Post: SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers

Related Posts

Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion Security Week News
Chinese Hackers Target Chinese Users With RAT, Rootkit Security Week News
Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices Security Week News
Anatsa Android Banking Trojan Now Targeting 830 Financial Apps Security Week News
Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment Security Week News
Production at Steelmaker Nucor Disrupted by Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing
  • Cisco Patches High-Severity IOS XR Vulnerabilities
  • kkRAT Employs Network Communication Protocol to Steal Clipboard Contents
  • Cornwell Quality Tools Data Breach
  • Critical Chrome Vulnerability Earns Researcher $43,000

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing
  • Cisco Patches High-Severity IOS XR Vulnerabilities
  • kkRAT Employs Network Communication Protocol to Steal Clipboard Contents
  • Cornwell Quality Tools Data Breach
  • Critical Chrome Vulnerability Earns Researcher $43,000

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News