Categories: Cyber Security News

Apple CarPlay Exploited To Gain Root Access By Executing Remote Code

At the recent DefCon security conference, researchers demonstrated a critical exploit chain that allows attackers to gain root access on vehicle infotainment systems by targeting Apple CarPlay.

The multi-stage attack, named “Pwn My Ride,” leverages a series of vulnerabilities in the protocols that underpin wireless CarPlay, culminating in remote code execution on the car’s multimedia unit.

The core of the exploit is CVE-2025-24132, a stack buffer overflow vulnerability within the AirPlay protocol SDK. Researchers from Oligo Security presented how this flaw can be triggered once an attacker gains access to the vehicle’s Wi-Fi network.

The vulnerability affects a wide range of devices that use AirPlay audio SDK versions before 2.7.1, AirPlay video SDK versions before 3.6.0.126, and specific versions of the CarPlay Communication Plug-in.

By exploiting this buffer overflow, an attacker can execute arbitrary code with the highest level of system privileges, effectively taking control of the infotainment system.

Exploiting the iAP2 Protocol

The attack begins by targeting the initial connection process of wireless CarPlay. This process relies on two key protocols: iAP2 (iPod Accessory Protocol) over Bluetooth and AirPlay over Wi-Fi.

The researchers discovered a fundamental authentication flaw within the iAP2 protocol. While the protocol ensures the car authenticates the phone, it fails to perform the reverse; the phone does not authenticate the car.

This one-way authentication allows an attacker’s device to impersonate a legitimate iPhone.

The attacker can then pair with the vehicle’s Bluetooth, often without a PIN code due to many systems defaulting to the insecure “Just Works” pairing mode.

Once paired, the attacker exploits the iAP2 flaw to send a RequestAccessoryWiFiConfigurationInformation command, which tricks the system into revealing the vehicle’s Wi-Fi SSID and password.

After obtaining the Wi-Fi credentials, the attacker connects to the car’s network and triggers CVE-2025-24132 to gain root access.

This entire sequence can be a zero-click attack on many vehicles, requiring no interaction from the driver.

Although Apple issued a patch for the vulnerable AirPlay SDK in April 2025, researchers noted that, to their knowledge, no car manufacturer has applied the fix, Oligo Security said.

Unlike smartphones, which receive frequent over-the-air (OTA) updates, vehicle software update cycles are notoriously slow and fragmented.

Many cars require a manual update at a dealership, and each automaker must independently test and validate the patched SDK for their specific hardware.

This significant delay leaves millions of vehicles exposed to this vulnerability long after a fix has been made available, highlighting a critical gap in the automotive supply chain’s security posture.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Apple CarPlay Exploited To Gain Root Access By Executing Remote Code appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Don’t Miss This Phenomenal Price Drop on the FlashForge AD5X Multi-Color 3D Printer at AliExpress

An excellent 3D printer with multi-color print capability just got a huge price drop ahead…

59 minutes ago

The AMD Radeon 9070 XT Graphics Card Creeps Ever Closer to MSRP During Amazon’s Memorial Day Sale

Similar to every other high-end GPU on the market, the AMD Radeon 9070 XT graphics…

59 minutes ago

Stranger Things Creators Promise They’ll Reveal Eleven’s Fate in 20 Years

Don't worry, the Duffer Brothers will be happy to tell you what happened to Eleven…

59 minutes ago

3 Tactics Mature SOCs Use to Eliminate Critical Business Risk

A data breach makes headlines for a day. The damage it leaves behind lasts years.  Critical…

1 hour ago

Linus Torvalds Says AI Bug Reports Overwhelm Linux Security Lists

Linus Torvalds has publicly declared that the Linux kernel’s private security mailing list has become…

1 hour ago

Critical n8n Vulnerabilities Expose Automation Nodes to Full RCE

A fresh set of critical vulnerabilities in the popular workflow automation platform n8n is raising…

2 hours ago

This website uses cookies.