Spoofing attack in Apple AirPods and Beats firmware



Published: 2024-06-27
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-27867
CWE-ID CWE-285
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
AirPods firmware
Hardware solutions / Firmware

Beats firmware
Hardware solutions / Firmware

Vendor Apple Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper Authorization

EUVDB-ID: #VU93406

Risk: Low

CVSSv3.1: 3.1 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-27867

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: No

Description

The vulnerability allows an attacker to perform spoofing attack.

The vulnerability exists due to the way the headphones are seeking a connection request to one of your previously paired devices. An attacker with physical proximity to the device can spoof the intended source device and gain access to your headphones.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

AirPods firmware: 4E71 - 6F7

Beats firmware: before 6F8

CPE2.3 External links

http://support.apple.com/en-us/HT214111


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###