
Apple has launched a firmware replace for AirPods that would permit a malicious actor to realize get entry to to the headphones in an unauthorized method.
Tracked as CVE-2024-27867, the authentication factor impacts AirPods (2d technology and later), AirPods Professional (all fashions), AirPods Max, Powerbeats Professional, and Beats Are compatible Professional.
“When your headphones are looking for a connection request to one in all your in the past paired units, an attacker in Bluetooth vary may be able to spoof the meant supply instrument and acquire get entry to for your headphones,” Apple mentioned in a Tuesday advisory.
In different phrases, an adversary in bodily proximity may just exploit the vulnerability to pay attention to personal conversations. Apple mentioned the problem has been addressed with advanced state control.
Jonas Dreßler has been credited with finding and reporting the flaw. It’s been patched as a part of AirPods Firmware Replace 6A326, AirPods Firmware Replace 6F8, and Beats Firmware Replace 6F8.
The improvement comes two weeks after the iPhone maker rolled out updates for visionOS (model 1.2) to near out 21 shortcomings, together with seven flaws within the WebKit browser engine.

Some of the problems relates to a common sense flaw (CVE-2024-27812) that would lead to a denial-of-service (DoS) when processing internet content material. The issue has been mounted with advanced record dealing with, it mentioned.
Safety researcher Ryan Pickren, who reported the vulnerability, described it because the “international’s first spatial computing hack” that may be weaponized to “bypass all warnings and forcefully fill your room with an arbitrary collection of animated 3-D items” sans person interplay.
The vulnerability takes good thing about Apple’s failure to use the permissions type when the usage of the ARKit Fast Glance characteristic to spawn 3-D items in a sufferer’s room. Making issues worse, those animated items proceed to persist even after exiting Safari as they’re treated via a separate software.
“Moreover, it does no longer even require this anchor tag to were ‘clicked’ via the human,” Pickren mentioned. “So programmatic JavaScript clicking (i.e., report.querySelector(‘a’).click on()) works no downside! Which means that we will be able to release an arbitrary collection of 3-D, animated, sound-creating, items with none person interplay in any respect.”