Description
An access issue was addressed with improved access restrictions. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing.
Published: 2025-04-29
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an access issue that allows an unauthenticated user on the same local network as a signed‑in Apple device to send arbitrary AirPlay commands without pairing. Because AirPlay commands can control media playback and trigger actions on the target device, an attacker who can reach the local network could potentially gain remote command execution capability or otherwise manipulate the device’s behavior. The weakness is identified as an unauthorized access flaw (CWE‑306) compounded by improper handling of data formats (CWE‑843).

Affected Systems

Apple iOS devices running 18.4, iPadOS devices running 18.4 or 17.7.6, macOS machines running Sequoia 15.4, Sonoma 14.7.5, or Ventura 13.7.5, tvOS 18.4, and visionOS 2.4 are affected.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity. The EPSS score of less than 1% suggests a very low probability that this flaw will be exploited in the wild, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is a local network attacker who does not need credentials and can simply send AirPlay commands after the target device signs in to a network. Exploitation requires the target to be reachable on the network and have AirPlay receiving enabled.

Generated by OpenCVE AI on April 28, 2026 at 02:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all affected Apple operating systems to the specified patch versions (iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, Sonoma 14.7.5, Ventura 13.7.5, tvOS 18.4, visionOS 2.4).
  • Disable AirPlay receiving on devices that do not need it by going to Settings > AirPlay & Handoff and turning off airplay receiving.
  • Restrict which devices can send AirPlay commands by configuring the allowed device list in Settings, or enforce local network segmentation and firewall rules to block unauthorized access from untrusted subnets.

Generated by OpenCVE AI on April 28, 2026 at 02:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-12735 An access issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing.
History

Tue, 28 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
Title Unauthenticated AirPlay Command Injection on Local Network

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description An access issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing. An access issue was addressed with improved access restrictions. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing.

Wed, 30 Apr 2025 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862

Wed, 30 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
CWE-843
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Tue, 29 Apr 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple visionos

Tue, 29 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Apr 2025 02:30:00 +0000

Type Values Removed Values Added
Description An access issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:14:20.175Z

Reserved: 2025-01-17T00:00:45.017Z

Link: CVE-2025-24271

cve-icon Vulnrichment

Updated: 2025-04-29T13:36:34.517Z

cve-icon NVD

Status : Modified

Published: 2025-04-29T03:15:34.770

Modified: 2026-04-02T19:19:31.103

Link: CVE-2025-24271

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T02:15:18Z

Weaknesses