Apple experts petition Apple to update AirPort router firmware to fix AirPlay high-risk vulnerabilities

IT Home on May 1st, security expert Gary Longsine launched a petition in change.org calling on Apple to update the AirPort router firmware and fix the AirBorne vulnerability, otherwise these devices will be eliminated due to security risks. Experts Petition Apple to Update AirPort Router Firmware, Fix AirPlay High-Risk Vulnerabilities Experts Petition Apple to Update AirPort Router Firmware, Fix AirPlay High-Risk Vulnerabilities IT Home released a blog post yesterday, briefly introducing the “Airborne” vulnerability, which exists in Apple AirPlay (AirPlay) function. Attackers can take advantage of this vulnerability to control AirPlay-enabled devices and spread malicious software to other connected devices, making crowded areas such as public Wi-Fi and business places a high-risk area. Apple discontinued the AirPort series as early as 2018, and the last firmware update stayed in June 2019. Longsine warned that if no action is taken, these routers will immediately lose their practical value and be forced to be eliminated. Experts petition Apple to update AirPort router firmware, fix AirPlay high-risk vulnerabilities Experts petition Apple to update AirPort router firmware, fix AirPlay high-risk vulnerabilities Longsine pointed out that the AirPort series is still widely used due to its ease of use, performance and durability. In contrast, other modern devices can patch vulnerabilities with updates, while AirPort may be ignored forever. Experts petition Apple to update AirPort router firmware, fix AirPlay high-risk vulnerabilities Experts petition Apple to update AirPort router firmware, fix AirPlay high-risk vulnerabilities Apple has released patches for older devices in the past. If the problem is serious enough, the latest models of AirPort Express and AirPort Extreme may still be able to receive updates. Longsine believes that discarding these devices not only creates waste, but also exposes unsuspecting users to the risk of attack.

评论

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注