Hackers Expose Critical Apple CarPlay Flaw At DefCon

At this yearโ€™s DefCon 33 security conference, security researchers unveiled a major flaw in Appleโ€™s CarPlay system that could allow hackers to take control of a carโ€™s infotainment system โ€” all without the driver clicking a thing โ€” a true zero-click exploit.

The demonstration, titled โ€œPwn My Rideโ€, shed light on how attackers could exploit weaknesses in the wireless version of CarPlay to run malicious code and gain full system access โ€” leaving millions of vehicles potentially at risk.

The Vulnerability At The Core

The critical flaw, tracked as CVE-2025-24132, is a stack buffer overflow found in Appleโ€™s AirPlay software development kit (SDK), the same protocol that is used to wirelessly mirror iPhone screens.

The vulnerability can be triggered once an attacker joins the vehicleโ€™s Wi-Fi network. It allows them to execute malicious code with root privileges โ€” the highest level of system access โ€” effectively giving them complete control of the multimedia system.

The issue affects:

  • AirPlay Audio SDK versions before 2.7.1
  • AirPlay Video SDK versions before 3.6.0.126
  • CarPlay Communication Plug-in versions before R18.1 (including R18.1 itself)

How The Attack Works

Researchers from Oligo Security explained in a blog post that the attack chain starts with Bluetooth pairing, which many cars still configure in โ€œJust Worksโ€ mode. This insecure setup means a hacker can easily connect without needing a PIN code.

After pairing, the hacker takes advantage of a design flaw in the iAP2 protocol โ€” the communication bridge between CarPlay and the iPhone. In this setup, the car verifies if the phone is legitimate, but the phone doesnโ€™t check the car in return. This gap allows a hackerโ€™s device to impersonate as an iPhone, trick the car into handing over its Wi-Fi password, and gain entry to the in-car network.

Once connected to Wi-Fi, the hacker can trigger the AirPlay vulnerability to seize control of the infotainment system. In many cases, the takeover requires no interaction from the driver and takes place completely in the background.

Patches Exist, But Cars Lag Behind

Apple quietly fixed the AirPlay vulnerability back in April 2025, but hereโ€™s the problem: very few car manufacturers have rolled out the update. Unlike smartphones or laptops, which receive automatic over-the-air (OTA) updates overnight, vehicles often depend on dealership visits, manual USB installs, or slow testing cycles before updates reach drivers.

Automakers must adapt Appleโ€™s patch, test it on their specific hardware, and validate it across different suppliers. This fragmented process can take months, if not years, leaving millions of cars exposed months after the patch was issued.

โ€œThe result is a long tail of exposure. While high-end models with robust OTA pipelines may be patched quickly, many others take months, years, or never receive the update at all. That leaves millions of vehicles potentially exposed โ€“ long after an โ€œofficialโ€ fix exists,” the researchers warned.

Why It Matters

While the vulnerability doesnโ€™t give hackers control over steering or brakes, it allows attackers to spy on drivers by tampering with apps or microphones, intercept communications or navigation data, install persistent malware in the infotainment system, or use the system as a stepping stone to other parts of the vehicle.

Security experts caution that car owners canโ€™t fix the issue on their own โ€” itโ€™s up to automakers and suppliers to adopt Appleโ€™s patched SDK and send it out to vehicles. Until then, drivers using wired CarPlay connections are safe, since they require physical access to exploit the vehicle.

As cars become more connected, the gap between innovation and safety will continue to put drivers at risk โ€” and the road to patching them isnโ€™t always smooth.

Kavita Iyer
Kavita Iyerhttps://www.techworm.net
An individual, optimist, homemaker, foodie, a die hard cricket fan and most importantly one who believes in Being Human!!!
spot_img

Read More

Suggested Post