PT-2025-18219 · Apple · Airplay Video Sdk+2
Published
2025-04-04
·
Updated
2026-03-21
·
CVE-2025-24132
CVSS v3.1
6.5
Medium
| AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
AirPlay audio SDK versions 2.7.1 and later
AirPlay video SDK versions 3.6.0.126 and later
CarPlay Communication Plug-in version R18.1 and later
Description
This issue involves improved memory handling to address a flaw that could allow a local network attacker to cause an unexpected application termination. The vulnerability, identified as a stack buffer overflow within the AirPlay protocol, is exposed when a device connects to a car’s multimedia system. Exploitation may allow an attacker to gain remote code execution (RCE) on the target device. The iAP2 protocol, used for connection management and data exchange, lacks proper input validation, enabling the sending of oversized data packets that can overwrite memory buffers. While a patch has been released by Apple, many car manufacturers have not yet applied the update to their infotainment systems, leaving vehicles vulnerable. The vulnerability is exploitable over Bluetooth and Wi-Fi. The
SET PARAMETER function is involved in the vulnerability.Recommendations
AirPlay audio SDK versions prior to 2.7.1 are vulnerable.
AirPlay video SDK versions prior to 3.6.0.126 are vulnerable.
CarPlay Communication Plug-in versions prior to R18.1 are vulnerable.
Exploit
Fix
RCE
DoS
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Airplay Audio Sdk
Airplay Video Sdk
Carplay Communication Plug-In