{"id":28978,"date":"2025-05-19T13:18:41","date_gmt":"2025-05-19T12:18:41","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/?p=28978"},"modified":"2025-05-19T13:18:41","modified_gmt":"2025-05-19T12:18:41","slug":"airborne-wormable-zero-click-vulnerability-in-apple-airplay","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/28978\/","title":{"rendered":"AirBorne: Attacks on Apple devices through vulnerabilities in AirPlay"},"content":{"rendered":"<p>Researchers have <a href=\"https:\/\/arstechnica.com\/security\/2025\/04\/millions-of-apple-airplay-enabled-devices-can-be-hacked-via-wi-fi\/\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> a series of major security flaws in Apple AirPlay. They\u2019ve dubbed this family of vulnerabilities \u2013 and the potential exploits based on them \u2013 \u201cAirBorne\u201d. The bugs can be leveraged individually or in combinations to carry out wireless attacks on a wide range of AirPlay-enabled hardware.<\/p>\n<p>We\u2019re mainly talking about Apple devices here, but there are also a number of gadgets from other vendors that have this tech built in \u2013 from smart speakers to cars. Let\u2019s dive into what makes these vulnerabilities dangerous, and how to protect your AirPlay-enabled devices from potential attacks.<\/p>\n<h2>What is Apple AirPlay?<\/h2>\n<p>First, a little background. AirPlay is an Apple-developed suite of protocols used for streaming audio and, increasingly, video between consumer devices. For example, you can use AirPlay to stream music from your smartphone to a smart speaker, or mirror your laptop screen on a TV.<\/p>\n<p>All this happens wirelessly: streaming typically uses Wi-Fi, or, as a fallback, a wired local network. It\u2019s worth noting that AirPlay can also operate without a centralized network \u2013 be it wired or wireless \u2013 by relying on Wi-Fi Direct, which establishes a direct connection between devices.<\/p>\n<div id=\"attachment_53454\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19125827\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53454\" class=\"size-large wp-image-53454\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19125827\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-1-1024x473.png\" alt=\"AirPlay Video and AirPlay Audio logos \" width=\"1024\" height=\"473\"><\/a><p id=\"caption-attachment-53454\" class=\"wp-caption-text\">AirPlay logos for video streaming (left) and audio streaming (right). These should look familiar if you own any devices made by the Cupertino company. <a href=\"https:\/\/developer.apple.com\/design\/resources\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Initially, only certain specialized devices could act as AirPlay receivers. These were AirPort Express routers, which could stream music from iTunes through the built-in audio output. Later, Apple TV set-top boxes, HomePod smart speakers, and similar devices from third-party manufacturers joined the party.<\/p>\n<p>However, in 2021, Apple decided to take things a step further \u2013 integrating an AirPlay receiver into macOS. This gave users the ability to mirror their iPhone or iPad screens on their Macs. iOS and iPadOS were next to get AirPlay receiver functionality \u2013 this time to display the image from Apple Vision Pro mixed-reality headsets.<\/p>\n<div id=\"attachment_53453\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19125851\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53453\" class=\"size-large wp-image-53453\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19125851\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-2-1024x593.png\" alt=\"AirPlay works with Wi-Fi Direct \" width=\"1024\" height=\"593\"><\/a><p id=\"caption-attachment-53453\" class=\"wp-caption-text\">AirPlay lets you stream content either over your regular network (wired or wireless), or by setting up a Wi-Fi Direct connection between devices. <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Wi-Fi_and_Wi-Fi_Diect.png\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>CarPlay, too, deserves a mention, being essentially a version of AirPlay that\u2019s been adapted for use in motor vehicles. As you might guess, the vehicle\u2019s infotainment system is what receives the stream in the case of CarPlay.<\/p>\n<p>So, over two decades, AirPlay has gone from a niche iTunes feature to one of Apple\u2019s core technologies that underpins a whole bunch of features in the ecosystem. And, most importantly, AirPlay is currently supported by hundreds of millions, if not billions, of devices, and many of them can act as receivers.<\/p>\n<h2>What\u2019s AirBorne, and why are these vulnerabilities a big deal?<\/h2>\n<p>AirBorne is a whole family of security flaws in the AirPlay protocol and the associated developer toolkit \u2013 the AirPlay SDK. Researchers have found a total of 23 vulnerabilities, which, after review, resulted in 17 CVE entries being registered. Here\u2019s the list, just to give you a sense of the scale of the problem:<\/p>\n<ol>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24126\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24126<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24129\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24129<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24131\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24131<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24132\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24132<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24137\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24137<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24177\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24177<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24179\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24179<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24206\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24206<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24251\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24251<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24252\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24252<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24270\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24270<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24271\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24271<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30422\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-30422<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30445\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-30445<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31197\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-31197<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31202\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-31202<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31203\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-31203<\/a><\/li>\n<\/ol>\n<div id=\"attachment_53452\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19125935\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-3.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53452\" class=\"size-large wp-image-53452\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19125935\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-3-1024x568.jpeg\" alt=\"AirBorne vulnerability family logo \" width=\"1024\" height=\"568\"><\/a><p id=\"caption-attachment-53452\" class=\"wp-caption-text\">You know how any serious vulnerability with a modicum of self-respect needs its own logo? Yeah, AirBorne\u2019s got one too. <a href=\"https:\/\/www.oligo.security\/blog\/airborne\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>These vulnerabilities are quite diverse: from remote code execution (RCE) to authentication bypass. They can be exploited individually or chained together. So, by exploiting AirBorne, attackers can carry out the following types of attacks:<\/p>\n<ul>\n<li>RCE \u2013 even without user interaction (zero-click attacks)<\/li>\n<li><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener\">Man-in-the-middle<\/a> (MitM) attacks<\/li>\n<li><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/dos-denial-of-service-attack\/\" target=\"_blank\" rel=\"noopener\">Denial of service<\/a> (DoS) attacks<\/li>\n<li>Sensitive information disclosure<\/li>\n<\/ul>\n<h2>Example of an attack that exploits the AirBorne vulnerabilities<\/h2>\n<p>The most dangerous of the AirBorne security flaws is the combination of <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24252\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24252<\/a> with <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24206\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24206<\/a>. In concert, these two can be used to <a href=\"https:\/\/www.youtube.com\/watch?v=ZmOvRLBL3Ys\" target=\"_blank\" rel=\"nofollow noopener\">successfully attack<\/a> macOS devices and enable RCE without any user interaction.<\/p>\n<p>To pull off the attack, the adversary needs to be on the same network as the victim, which is realistic if, for example, the victim is connected to public Wi-Fi. In addition, the AirPlay receiver has to be enabled in macOS settings, with <em>Allow AirPlay for<\/em> set to either <em>Anyone on the Same Network<\/em> or <em>Everyone<\/em>.<\/p>\n<div id=\"attachment_53451\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130021\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-4.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53451\" class=\"size-large wp-image-53451\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130021\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-4-1024x665.jpeg\" alt=\"Successful zero-click attack on macOS via AirBorne \" width=\"1024\" height=\"665\"><\/a><p id=\"caption-attachment-53451\" class=\"wp-caption-text\">The researchers carried out a zero-click attack on macOS, which resulted in swapping out the pre-installed Apple Music app with a malicious payload. In this case, it was an image with the AirBorne logo. <a href=\"https:\/\/www.youtube.com\/watch?v=ZmOvRLBL3Ys\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>What\u2019s most troubling is that this attack can spawn a network worm. In other words, the attackers can execute malicious code on an infected system, which will then automatically spread to other vulnerable Macs on any network patient zero connects to. So, someone connecting to free Wi-Fi could inadvertently bring the infection into their work or home network.<\/p>\n<p>The researchers also looked into and were able to execute other attacks that leveraged AirBorne. These include another attack on macOS allowing RCE, which requires a single user action but works even if <em>Allow AirPlay for<\/em> is set to the more restrictive <em>Current User<\/em> option.<\/p>\n<p>The researchers also managed to attack a smart speaker through AirPlay, achieving RCE without any user interaction and regardless of any settings. This attack could also turn into a network worm, where the malicious code spreads from one device to another on its own.<\/p>\n<div id=\"attachment_53450\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130104\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-5.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53450\" class=\"size-large wp-image-53450\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130104\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-5-1024x665.jpeg\" alt=\"Successful zero-click attack on a smart speaker via AirBorne \" width=\"1024\" height=\"665\"><\/a><p id=\"caption-attachment-53450\" class=\"wp-caption-text\">Hacking an AirPlay-enabled smart speaker by exploiting AirBorne vulnerabilities. <a href=\"https:\/\/www.youtube.com\/watch?v=vcs5G4JWab8\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Source<\/a><\/p><\/div>\n<p>Finally, the researchers explored and tested out several attack scenarios on car infotainment units through CarPlay. Again, they were able to achieve arbitrary code execution without the car owner doing anything. This type of attack could be used to track someone\u2019s movements or eavesdrop on conversations inside the car. Then again, you might remember that there are <a href=\"https:\/\/www.kaspersky.com\/blog\/tracking-and-hacking-kia-cars-via-internet\/52497\/\" target=\"_blank\" rel=\"noopener nofollow\">simpler ways to track and hack cars<\/a>.<\/p>\n<div id=\"attachment_53449\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130136\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-6.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53449\" class=\"size-large wp-image-53449\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130136\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-6-1024x665.jpeg\" alt=\"Successful zero-click attack on a vehicle via a CarPlay vulnerability \" width=\"1024\" height=\"665\"><\/a><p id=\"caption-attachment-53449\" class=\"wp-caption-text\">Hacking a CarPlay-enabled car infotainment system by exploiting AirBorne vulnerabilities. <a href=\"https:\/\/www.youtube.com\/watch?v=eq8bUwFuSUM\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Source<\/a><\/p><\/div>\n<h2>Staying safe from AirBorne attacks<\/h2>\n<p>The most important thing you can do to protect yourself from AirBorne attacks is to update all your AirPlay-enabled devices. In particular, do this:<\/p>\n<ul>\n<li>Update iOS to version 18.4 or later.<\/li>\n<li>Update macOS to Sequoia 15.4, Sonoma 14.7.5, Ventura 13.7.5, or later.<\/li>\n<li>Update iPadOS to version 17.7.6 (for older iPads), 18.4, or later.<\/li>\n<li>Update tvOS to version 18.4 or later.<\/li>\n<li>Update visionOS to version 2.4 or later.<\/li>\n<\/ul>\n<p>As an extra precaution, or if you can\u2019t update for some reason, it\u2019s also a good idea to do the following:<\/p>\n<ol>\n<li>Disable the AirPlay receiver on your devices when you\u2019re not using it. You can find the required setting by searching for \u201cAirPlay\u201d.<\/li>\n<\/ol>\n<div id=\"attachment_53448\" style=\"width: 483px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130352\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-7.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53448\" class=\"size-large wp-image-53448\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130352\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-7-473x1024.png\" alt=\"AirPlay settings in iOS to protect against AirBorne attacks \" width=\"473\" height=\"1024\"><\/a><p id=\"caption-attachment-53448\" class=\"wp-caption-text\">How to configure AirPlay in iOS to protect against attacks that exploit the AirBorne family of vulnerabilities<\/p><\/div>\n<ol start=\"2\">\n<li>Restrict who can stream to your Apple devices in the AirPlay settings on each of them. To do this, set <em>Allow AirPlay for<\/em> to <em>Current User<\/em>. This won\u2019t rule out AirBorne attacks completely, but it\u2019ll make them harder to pull off.<\/li>\n<\/ol>\n<div id=\"attachment_53447\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130430\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-8.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53447\" class=\"size-large wp-image-53447\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2025\/05\/19130430\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-8-1024x936.jpeg\" alt=\"AirPlay settings in macOS to protect against AirBorne attacks \" width=\"1024\" height=\"936\"><\/a><p id=\"caption-attachment-53447\" class=\"wp-caption-text\">How to configure AirPlay in macOS to protect against attacks that exploit the AirBorne family of vulnerabilities<\/p><\/div>\n<p>Install <a href=\"https:\/\/www.kaspersky.co.uk\/premium?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">a reliable security solution<\/a>\u00a0on all your devices. Despite the popular myth, Apple devices aren\u2019t cyber-bulletproof and need protection too.<\/p>\n<blockquote><p>What other vulnerabilities can Apple users run into? These are just a few examples:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/52980\/\" target=\"_blank\" rel=\"noopener nofollow\">SparkCat trojan stealer infiltrates App Store and Google Play, steals data from photos<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/banshee-stealer-targets-macos-users\/52933\/\" target=\"_blank\" rel=\"noopener nofollow\">Banshee: A stealer targeting macOS users<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/gazeploit-how-to-steal-passwords-apple-vision-pro\/52267\/\" target=\"_blank\" rel=\"noopener nofollow\">How to snoop on Apple Vision Pro user passwords<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/50018\/\" target=\"_blank\" rel=\"noopener nofollow\">Are Macs safe?<\/a><a href=\"https:\/\/www.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/50018\/\" target=\"_blank\" rel=\"noopener nofollow\"> Threats to macOS users<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/triangulation-attack-on-ios\/48353\/\" target=\"_blank\" rel=\"noopener nofollow\">A matter of triangulation<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi \u2013 including zero-click exploits.<\/p>\n","protected":false},"author":2726,"featured_media":28981,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[14,111,1078,1150,3348,527,97,529,3865,3866,268,3748],"class_list":{"0":"post-28978","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apple","9":"tag-attacks","10":"tag-exploits","11":"tag-ios","12":"tag-ipados","13":"tag-macos","14":"tag-security-2","15":"tag-threats","16":"tag-tvos","17":"tag-visionos","18":"tag-vulnerabilities","19":"tag-zero-click"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/28978\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/28878\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/24101\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/12446\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/28143\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/30965\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/29677\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/39544\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/13376\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/53443\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/22802\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/23814\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/32202\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/29154\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/34919\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/34550\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/28978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=28978"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/28978\/revisions"}],"predecessor-version":[{"id":28983,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/28978\/revisions\/28983"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/28981"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=28978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=28978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=28978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}