Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance

Posted on September 11, 2025September 11, 2025 By CWS

Researchers have disclosed particulars of a distant CarPlay hack that may permit attackers to spy on drivers or distract them. 

Runtime software safety agency Oligo earlier this yr revealed that its researchers had found doubtlessly severe vulnerabilities in Apple’s AirPlay wi-fi communication protocol and the accompanying SDK, warning that they may permit hackers to remotely take over gadgets.

AirPlay is utilized by Apple merchandise, however the tech large has additionally licensed its use to different distributors, which have carried out it in TVs, audio programs, and streaming gadgets.

Oligo famous on the time that the vulnerabilities, collectively tracked as AirBorne, may very well be exploited for distant code execution, safety bypass, data disclosure, DoS assaults, and MitM assaults. 

One of many flaws, tracked as CVE-2025-24132, permits attackers to create wormable zero-click distant code execution exploits that allow them to make use of compromised gadgets as a launchpad for extra assaults.

Oligo talked about on the time that an assault is also launched in opposition to CarPlay programs, with none consumer interplay. The corporate has now shared extra particulars on CarPlay — particularly Apple CarPlay — assaults.

The cybersecurity agency defined that an attacker might conduct wired assaults by connecting to the focused CarPlay system by way of USB. Nevertheless, wi-fi assaults are additionally doable, together with over Wi-Fi, which leverages the truth that many distributors use default Wi-Fi passwords.

Wi-fi assaults will also be performed over Bluetooth. The attacker can pair with the focused CarPlay system over Bluetooth so long as they’re in vary. If PIN pairing is enabled, the attacker will possible see the required 4-digit PIN on the display screen of the automobile’s infotainment system. In some circumstances so-called ‘simply works’ pairing is enabled, which permits the attacker to simply connect with the system with none consumer interplay.Commercial. Scroll to proceed studying.

The assault targets the iAP2 protocol utilized by CarPlay to determine a wi-fi connection. iAP2 makes use of one-way authentication, the place the cellphone authenticates the car’s head unit, however the head unit doesn’t authenticate the cellphone. 

“Put plainly, the automobile checks that it’s speaking to a official gadget, however the gadget will settle for any consumer that speaks iAP2. Which means an attacker with a Bluetooth radio and a suitable iAP2 consumer can impersonate an iPhone, request the Wi-Fi credentials, set off app launches and challenge any iAP2 command,” Oligo defined. 

As soon as the hacker has accomplished the Bluetooth pairing course of, they’ll authenticate by way of iAP2, acquire WiFi credentials, and connect with the automobile hotspot. From there they’ll exploit the beforehand talked about AirPlay SDK vulnerability (CVE-2025-24132) to realize distant code execution with root privileges. 

The attacker can then take over the display screen and show photographs or play audio to distract the motive force. The attacker might additionally snoop on conversations or monitor the car’s location.

Apple patched CVE-2025-24132 in late April, however only some distributors have built-in the patch into their merchandise and Oligo will not be conscious of any automobile producer making use of the patch, which is why it has not made public full technical particulars. 

“Even after Apple launched a patched SDK, every automaker should adapt, take a look at, and validate it for their very own programs – coordinating throughout head-unit suppliers, inside software program groups, and typically middleware suppliers. Every step introduces potential delays and requires strong collaboration,” Oligo defined.

“The result’s an extended tail of publicity,” it added. “Whereas high-end fashions with strong OTA pipelines could also be patched rapidly, many others take months, years, or by no means obtain the replace in any respect. That leaves hundreds of thousands of autos doubtlessly uncovered – lengthy after an ‘official’ repair exists.”

Associated: Jaguar Land Rover Admits Information Breach Attributable to Current Cyberattack

Associated: Free Wi-Fi Leaves Buses Weak to Distant Hacking

Associated: Flaws in Main Automaker’s Dealership Programs Allowed Automotive Hacking, Private Information Theft

Security Week News Tags:CarPlay, Distraction, Drivers, Hack, Puts, Remote, Risk, Surveillance

Post navigation

Previous Post: NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges
Next Post: SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers

Related Posts

Manifold Secures  Million to Enhance AI Security Manifold Secures $8 Million to Enhance AI Security Security Week News
United Natural Foods Projects Up to 0M Sales Hit from June Cyberattack United Natural Foods Projects Up to $400M Sales Hit from June Cyberattack Security Week News
Arkanix Stealer Malware Ceases Operations Quickly Arkanix Stealer Malware Ceases Operations Quickly Security Week News
HPE AOS-CX Flaw Allows Admin Password Resets HPE AOS-CX Flaw Allows Admin Password Resets Security Week News
ChatGPT Deep Research Targeted in Server-Side Data Theft Attack ChatGPT Deep Research Targeted in Server-Side Data Theft Attack Security Week News
AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark