Categories: Cyber Security News

Apple CarPlay Exploited To Gain Root Access By Executing Remote Code

At the recent DefCon security conference, researchers demonstrated a critical exploit chain that allows attackers to gain root access on vehicle infotainment systems by targeting Apple CarPlay.

The multi-stage attack, named “Pwn My Ride,” leverages a series of vulnerabilities in the protocols that underpin wireless CarPlay, culminating in remote code execution on the car’s multimedia unit.

The core of the exploit is CVE-2025-24132, a stack buffer overflow vulnerability within the AirPlay protocol SDK. Researchers from Oligo Security presented how this flaw can be triggered once an attacker gains access to the vehicle’s Wi-Fi network.

The vulnerability affects a wide range of devices that use AirPlay audio SDK versions before 2.7.1, AirPlay video SDK versions before 3.6.0.126, and specific versions of the CarPlay Communication Plug-in.

By exploiting this buffer overflow, an attacker can execute arbitrary code with the highest level of system privileges, effectively taking control of the infotainment system.

Exploiting the iAP2 Protocol

The attack begins by targeting the initial connection process of wireless CarPlay. This process relies on two key protocols: iAP2 (iPod Accessory Protocol) over Bluetooth and AirPlay over Wi-Fi.

The researchers discovered a fundamental authentication flaw within the iAP2 protocol. While the protocol ensures the car authenticates the phone, it fails to perform the reverse; the phone does not authenticate the car.

This one-way authentication allows an attacker’s device to impersonate a legitimate iPhone.

The attacker can then pair with the vehicle’s Bluetooth, often without a PIN code due to many systems defaulting to the insecure “Just Works” pairing mode.

Once paired, the attacker exploits the iAP2 flaw to send a RequestAccessoryWiFiConfigurationInformation command, which tricks the system into revealing the vehicle’s Wi-Fi SSID and password.

After obtaining the Wi-Fi credentials, the attacker connects to the car’s network and triggers CVE-2025-24132 to gain root access.

This entire sequence can be a zero-click attack on many vehicles, requiring no interaction from the driver.

Although Apple issued a patch for the vulnerable AirPlay SDK in April 2025, researchers noted that, to their knowledge, no car manufacturer has applied the fix, Oligo Security said.

Unlike smartphones, which receive frequent over-the-air (OTA) updates, vehicle software update cycles are notoriously slow and fragmented.

Many cars require a manual update at a dealership, and each automaker must independently test and validate the patched SDK for their specific hardware.

This significant delay leaves millions of vehicles exposed to this vulnerability long after a fix has been made available, highlighting a critical gap in the automotive supply chain’s security posture.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Apple CarPlay Exploited To Gain Root Access By Executing Remote Code appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

A Look Back, April 9

50 Years Ago A Hadley woman fell for a ruse at the Food Mart store…

35 minutes ago

Mount Holyoke commits $3M to South Hadley over next 10 years

SOUTH HADLEY — About a week before residents decide on a big Proposition 2½ override…

35 minutes ago

A masterpiece meant to vanish: Tibetan monks create — then destroy — intricate sand mandala at UMass to symbolize impermanence

AMHERST — A work of art at the University of Massachusetts Amherst will be gone…

36 minutes ago

Easthampton 9/11 memorial plans take shape with two sites under consideration

EASTHAMPTON — The citywide group dedicated to creating a permanent memorial to honor the lives lost…

37 minutes ago

Massachusetts’ only freestanding birth center in Northampton at risk of closure

BOSTON — Seven Sisters Midwifery & Community Birth Center in Florence, Massachusetts’s only freestanding birth…

37 minutes ago

Northwestern First Assistant DA honored with state award

NORTHAMPTON — After 24 years prosecuting some of the region’s most serious and high-profile criminal…

37 minutes ago

This website uses cookies.