{"id":13376,"date":"2025-05-27T14:05:37","date_gmt":"2025-05-27T11:05:37","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13376"},"modified":"2025-05-27T14:05:37","modified_gmt":"2025-05-27T11:05:37","slug":"airborne-wormable-zero-click-vulnerability-in-apple-airplay","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/13376\/","title":{"rendered":"AirBorne: AirPlay&#8217;deki g\u00fcvenlik a\u00e7\u0131klar\u0131 \u00fczerinden Apple cihazlar\u0131na sald\u0131r\u0131lar"},"content":{"rendered":"<p>Ara\u015ft\u0131rmac\u0131lar Apple AirPlay\u2019de bir dizi \u00f6nemli g\u00fcvenlik a\u00e7\u0131\u011f\u0131 <a href=\"https:\/\/arstechnica.com\/security\/2025\/04\/millions-of-apple-airplay-enabled-devices-can-be-hacked-via-wi-fi\/\" target=\"_blank\" rel=\"nofollow noopener\">ke\u015ffetti<\/a>. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ailesine ve bunlara dayal\u0131 potansiyel a\u00e7\u0131klara \u201cAirBorne\u201d ad\u0131n\u0131 verdiler. Bu hatalar tek tek ya da birlikte kullan\u0131larak \u00e7ok say\u0131da AirPlay \u00f6zellikli donan\u0131ma kablosuz sald\u0131r\u0131lar ger\u00e7ekle\u015ftirilebilir.<\/p>\n<p>Burada esas olarak Apple cihazlar\u0131ndan bahsediyoruz, ancak ak\u0131ll\u0131 hoparl\u00f6rlerden arabalara kadar bu teknolojiye sahip di\u011fer \u00fcreticilerin bir\u00e7ok cihaz\u0131 da var. Bu g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 neyin tehlikeli k\u0131ld\u0131\u011f\u0131n\u0131 ve AirPlay \u00f6zellikli cihazlar\u0131n\u0131z\u0131 olas\u0131 sald\u0131r\u0131lardan nas\u0131l koruyaca\u011f\u0131n\u0131z\u0131 inceleyelim.<\/p>\n<h2>Apple AirPlay nedir?<\/h2>\n<p>\u0130lk olarak, biraz ge\u00e7mi\u015finden bahsedelim. AirPlay, t\u00fcketici cihazlar\u0131 aras\u0131nda ses ve giderek artan oranda video ak\u0131\u015f\u0131 i\u00e7in kullan\u0131lan Apple taraf\u0131ndan geli\u015ftirilmi\u015f bir protokol paketidir. \u00d6rne\u011fin, AirPlay\u2019i kullanarak ak\u0131ll\u0131 telefonunuzdan ak\u0131ll\u0131 hoparl\u00f6re m\u00fczik ak\u0131\u015f\u0131 yapabilir veya diz\u00fcst\u00fc bilgisayar\u0131n\u0131z\u0131n ekran\u0131n\u0131 TV\u2019ye yans\u0131tabilirsiniz.<\/p>\n<p>T\u00fcm bunlar kablosuz olarak ger\u00e7ekle\u015fir ve ak\u0131\u015f genellikle Wi-Fi veya yedek olarak kablolu bir yerel a\u011f kullan\u0131r. AirPlay\u2019in, cihazlar aras\u0131nda do\u011frudan ba\u011flant\u0131 kuran Wi-Fi Direct\u2019e dayanarak, kablolu veya kablosuz merkezi bir a\u011f olmadan da \u00e7al\u0131\u015fabilece\u011fini belirtmek gerekir.<\/p>\n<div id=\"attachment_13380\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132327\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13380\" class=\"size-full wp-image-13380\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132327\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-1.png\" alt=\"AirPlay Video ve AirPlay Audio logolar\u0131\" width=\"1460\" height=\"674\"><\/a><p id=\"caption-attachment-13380\" class=\"wp-caption-text\">Video ak\u0131\u015f\u0131 (solda) ve ses ak\u0131\u015f\u0131 (sa\u011fda) i\u00e7in AirPlay logolar\u0131. Cupertino \u015firketi taraf\u0131ndan \u00fcretilen herhangi bir cihaza sahipseniz bunlar size tan\u0131d\u0131k gelecektir. <a href=\"https:\/\/developer.apple.com\/design\/resources\/\" target=\"_blank\" rel=\"nofollow noopener\">Kaynak<\/a><\/p><\/div>\n<p>Ba\u015flang\u0131\u00e7ta, yaln\u0131zca belirli \u00f6zel cihazlar AirPlay al\u0131c\u0131s\u0131 olarak i\u015flev g\u00f6rebiliyordu. Bunlar, dahili ses \u00e7\u0131k\u0131\u015f\u0131 arac\u0131l\u0131\u011f\u0131yla iTunes\u2019dan m\u00fczik ak\u0131\u015f\u0131 sa\u011flayabilen AirPort Express y\u00f6nlendiricileriydi. Daha sonra Apple TV set \u00fcst\u00fc kutular\u0131, HomePod ak\u0131ll\u0131 hoparl\u00f6rler ve \u00fc\u00e7\u00fcnc\u00fc taraf \u00fcreticilerin benzer cihazlar\u0131 partiye kat\u0131ld\u0131.<\/p>\n<p>Ancak 2021\u2019de Apple i\u015fleri bir ad\u0131m \u00f6teye ta\u015f\u0131maya karar vererek macOS\u2019a bir AirPlay al\u0131c\u0131s\u0131 entegre etti. Bu sayede kullan\u0131c\u0131lar iPhone veya iPad ekranlar\u0131n\u0131 Mac\u2019lerine yans\u0131tabiliyorlard\u0131. iOS ve iPadOS, bu kez Apple Vision Pro karma ger\u00e7eklik kulakl\u0131klar\u0131ndan gelen g\u00f6r\u00fcnt\u00fcy\u00fc g\u00f6r\u00fcnt\u00fclemek i\u00e7in AirPlay al\u0131c\u0131s\u0131 i\u015flevine sahip oldu.<\/p>\n<div id=\"attachment_13381\" style=\"width: 1292px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132425\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13381\" class=\"size-full wp-image-13381\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132425\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-2.png\" alt=\"AirPlay, Wi-Fi Direct ile \u00e7al\u0131\u015f\u0131r\" width=\"1282\" height=\"742\"><\/a><p id=\"caption-attachment-13381\" class=\"wp-caption-text\">AirPlay, normal a\u011f\u0131n\u0131z \u00fczerinden (kablolu veya kablosuz) veya cihazlar aras\u0131nda bir Wi-Fi Direct ba\u011flant\u0131s\u0131 kurarak i\u00e7erik ak\u0131\u015f\u0131 yapman\u0131z\u0131 sa\u011flar. <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Wi-Fi_and_Wi-Fi_Diect.png\" target=\"_blank\" rel=\"nofollow noopener\">Kaynak<\/a><\/p><\/div>\n<p>CarPlay de asl\u0131nda AirPlay\u2019in motorlu ta\u015f\u0131tlarda kullan\u0131lmak \u00fczere uyarlanm\u0131\u015f bir versiyonu olarak an\u0131lmay\u0131 hak ediyor. Tahmin edebilece\u011finiz gibi, CarPlay s\u00f6z konusu oldu\u011funda ak\u0131\u015f\u0131 alan \u015fey arac\u0131n bilgi-e\u011flence sistemidir.<\/p>\n<p>B\u00f6ylece, yirmi y\u0131l\u0131 a\u015fk\u0131n bir s\u00fcredir AirPlay, ni\u015f bir iTunes \u00f6zelli\u011finden Apple\u2019\u0131n ekosistemdeki bir dizi \u00f6zelli\u011fin temelini olu\u015fturan temel teknolojilerinden biri haline geldi. Ve en \u00f6nemlisi, AirPlay \u015fu anda milyarlarca olmasa da y\u00fcz milyonlarca cihaz taraf\u0131ndan destekleniyor ve bunlar\u0131n \u00e7o\u011fu al\u0131c\u0131 olarak i\u015flev g\u00f6rebiliyor.<\/p>\n<h2>AirBorne nedir ve bu g\u00fcvenlik a\u00e7\u0131klar\u0131 neden bu kadar \u00f6nemli?<\/h2>\n<p>AirBorne, AirPlay protokol\u00fcnde ve ilgili geli\u015ftirici ara\u00e7 seti olan AirPlay SDK\u2019da bulunan bir dizi g\u00fcvenlik a\u00e7\u0131\u011f\u0131d\u0131r. Ara\u015ft\u0131rmac\u0131lar toplam 23 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulmu\u015f ve bu a\u00e7\u0131klar incelendikten sonra 17 CVE giri\u015fi kaydedilmi\u015ftir. \u0130\u015fte size sorunun boyutu hakk\u0131nda fikir verecek bir liste:<\/p>\n<ol>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24126\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24126<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24129\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24129<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24131\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24131<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24132\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24132<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24137\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24137<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24177\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24177<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24179\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24179<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24206\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24206<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24251\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24251<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24252\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24252<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24270\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24270<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24271\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24271<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30422\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-30422<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30445\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-30445<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31197\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-31197<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31202\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-31202<\/a><\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31203\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-31203<\/a><\/li>\n<\/ol>\n<div id=\"attachment_13382\" style=\"width: 2714px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132536\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-3.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13382\" class=\"size-full wp-image-13382\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132536\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-3.jpeg\" alt=\"AirBorne g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ailesi logosu\" width=\"2704\" height=\"1500\"><\/a><p id=\"caption-attachment-13382\" class=\"wp-caption-text\">Bir nebze olsun kendine sayg\u0131s\u0131 olan her ciddi g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n kendi logosuna ihtiyac\u0131 oldu\u011fu malum. Evet, AirBorne\u2019da da bir tane var. <a href=\"https:\/\/www.oligo.security\/blog\/airborne\" target=\"_blank\" rel=\"nofollow noopener\">Kaynak<\/a><\/p><\/div>\n<p>Bu g\u00fcvenlik a\u00e7\u0131klar\u0131 uzaktan kod y\u00fcr\u00fctmeden (RCE) kimlik do\u011frulama atlamas\u0131na kadar olduk\u00e7a \u00e7e\u015fitlidir. Bunlar tek tek veya zincirleme olarak kullan\u0131labilirler. Dolay\u0131s\u0131yla, sald\u0131rganlar AirBorne\u2019dan faydalanarak a\u015fa\u011f\u0131daki sald\u0131r\u0131 t\u00fcrlerini ger\u00e7ekle\u015ftirebilirler:<\/p>\n<ul>\n<li>RCE \u2013 kullan\u0131c\u0131 etkile\u015fimi olmadan bile (s\u0131f\u0131r t\u0131klama sald\u0131r\u0131lar\u0131)<\/li>\n<li><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">Ortadaki Adam<\/a> (MitM) sald\u0131r\u0131lar\u0131<\/li>\n<li><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/dos-denial-of-service-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">Hizmet Reddi<\/a> (DoS) sald\u0131r\u0131lar\u0131<\/li>\n<li>Hassas bilgilerin if\u015fas\u0131<\/li>\n<\/ul>\n<h2>AirBorne g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanan bir sald\u0131r\u0131 \u00f6rne\u011fi<\/h2>\n<p>AirBorne g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n en tehlikelisi <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24252\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24252<\/a> ile <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24206\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-24206<\/a>\u2018n\u0131n birle\u015fimidir. Bu ikisi birlikte, macOS cihazlar\u0131na <a href=\"https:\/\/www.youtube.com\/watch?v=ZmOvRLBL3Ys\" target=\"_blank\" rel=\"nofollow noopener\">ba\u015far\u0131l\u0131 bir \u015fekilde sald\u0131rmak<\/a> ve herhangi bir kullan\u0131c\u0131 etkile\u015fimi olmadan RCE\u2019yi etkinle\u015ftirmek i\u00e7in kullan\u0131labilir.<\/p>\n<p>Sald\u0131r\u0131y\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in sald\u0131rgan\u0131n kurbanla ayn\u0131 a\u011fda olmas\u0131 gerekir ki bu da \u00f6rne\u011fin kurban\u0131n halka a\u00e7\u0131k bir Wi-Fi a\u011f\u0131na ba\u011fl\u0131 olmas\u0131 durumunda olduk\u00e7a ger\u00e7ek\u00e7i bir senaryodur. Buna ek olarak, AirPlay al\u0131c\u0131s\u0131n\u0131n macOS ayarlar\u0131nda etkinle\u015ftirilmesi ve <em>Allow AirPlay for<\/em> se\u00e7ene\u011finin <em>Anyone on the Same Network<\/em> veya <em>Everyone<\/em> olarak ayarlanmas\u0131 gerekir.<\/p>\n<div id=\"attachment_13383\" style=\"width: 2714px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132625\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-4.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13383\" class=\"size-full wp-image-13383\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132625\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-4.jpeg\" alt=\"AirBorne arac\u0131l\u0131\u011f\u0131yla macOS'a ba\u015far\u0131l\u0131 s\u0131f\u0131r t\u0131klama sald\u0131r\u0131s\u0131\" width=\"2704\" height=\"1756\"><\/a><p id=\"caption-attachment-13383\" class=\"wp-caption-text\">Ara\u015ft\u0131rmac\u0131lar macOS \u00fczerinde s\u0131f\u0131r t\u0131klamal\u0131 bir sald\u0131r\u0131 ger\u00e7ekle\u015ftirerek \u00f6nceden y\u00fcklenmi\u015f Apple Music uygulamas\u0131n\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 bir y\u00fck ile de\u011fi\u015ftirilmesini sa\u011flad\u0131lar. Bu \u00f6rnekte, AirBorne logolu bir g\u00f6rsel s\u00f6z konusuydu. <a href=\"https:\/\/www.youtube.com\/watch?v=ZmOvRLBL3Ys\" target=\"_blank\" rel=\"nofollow noopener\">Kaynak<\/a><\/p><\/div>\n<p>En endi\u015fe verici olan \u015fey ise bu sald\u0131r\u0131n\u0131n bir a\u011f solucan\u0131 olu\u015fturabilmesi. Ba\u015fka bir deyi\u015fle, sald\u0131rganlar vir\u00fcs bula\u015fm\u0131\u015f bir sistemde k\u00f6t\u00fc ama\u00e7l\u0131 kod \u00e7al\u0131\u015ft\u0131rabilir ve bu kod daha sonra ilk kurban\u0131n ba\u011fland\u0131\u011f\u0131 herhangi bir a\u011fdaki di\u011fer savunmas\u0131z Mac\u2019lere otomatik olarak yay\u0131l\u0131r. Dolay\u0131s\u0131yla, \u00fccretsiz Wi-Fi\u2019a ba\u011flanan bir ki\u015fi yanl\u0131\u015fl\u0131kla vir\u00fcs\u00fc kendi i\u015f ya da ev a\u011f\u0131na ta\u015f\u0131yabilir.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar ayr\u0131ca AirBorne\u2019dan yararlanan di\u011fer sald\u0131r\u0131lar\u0131 da incelediler ve bu sald\u0131r\u0131lar\u0131 ba\u015far\u0131yla uygulad\u0131lar. Bunlar aras\u0131nda macOS\u2019ta tek bir kullan\u0131c\u0131 eylemi gerektiren ancak <em>Allow AirPlay for<\/em> se\u00e7ene\u011fi daha k\u0131s\u0131tlay\u0131c\u0131 olan <em>Current User<\/em> se\u00e7ene\u011fine ayarlanm\u0131\u015f olsa bile \u00e7al\u0131\u015fan RCE\u2019ye izin veren ba\u015fka bir sald\u0131r\u0131 da bulunuyor.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar ayr\u0131ca AirPlay arac\u0131l\u0131\u011f\u0131yla bir ak\u0131ll\u0131 hoparl\u00f6re sald\u0131rmay\u0131 ba\u015fararak herhangi bir kullan\u0131c\u0131 etkile\u015fimi olmadan ve herhangi bir ayardan ba\u011f\u0131ms\u0131z olarak uzaktan kod y\u00fcr\u00fctme ger\u00e7ekle\u015ftirdiler. Bu sald\u0131r\u0131, k\u00f6t\u00fc niyetli kodun bir cihazdan di\u011ferine kendi kendine yay\u0131ld\u0131\u011f\u0131 bir a\u011f solucan\u0131na da d\u00f6n\u00fc\u015febilir.<\/p>\n<div id=\"attachment_13384\" style=\"width: 2714px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132719\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-5.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13384\" class=\"size-full wp-image-13384\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27132719\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-5.jpeg\" alt=\"AirBorne arac\u0131l\u0131\u011f\u0131yla bir ak\u0131ll\u0131 hoparl\u00f6re y\u00f6nelik ba\u015far\u0131l\u0131 s\u0131f\u0131r t\u0131klama sald\u0131r\u0131s\u0131\" width=\"2704\" height=\"1756\"><\/a><p id=\"caption-attachment-13384\" class=\"wp-caption-text\">AirBorne g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanarak AirPlay \u00f6zellikli bir ak\u0131ll\u0131 hoparl\u00f6r\u00fc hacklemek. <a href=\"https:\/\/www.youtube.com\/watch?v=vcs5G4JWab8\" target=\"_blank\" rel=\"nofollow noopener\">Kaynak<\/a><\/p><\/div>\n<p>Son olarak, ara\u015ft\u0131rmac\u0131lar CarPlay arac\u0131l\u0131\u011f\u0131yla otomobil bilgi-e\u011flence \u00fcnitelerine y\u00f6nelik \u00e7e\u015fitli sald\u0131r\u0131 senaryolar\u0131n\u0131 ara\u015ft\u0131rd\u0131 ve test etti. Yine, ara\u00e7 sahibi hi\u00e7bir \u015fey yapmadan, keyfi kod \u00e7al\u0131\u015ft\u0131rmay\u0131 ba\u015fard\u0131lar. Bu t\u00fcr bir sald\u0131r\u0131, birinin hareketlerini izlemek veya ara\u00e7 i\u00e7indeki konu\u015fmalar\u0131 gizlice dinlemek i\u00e7in kullan\u0131labilir. \u00d6te yandan, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tracking-and-hacking-kia-cars-via-internet\/12916\/\" target=\"_blank\" rel=\"noopener\">ara\u00e7lar\u0131 takip etmenin ve hacklemenin daha basit yollar\u0131<\/a> oldu\u011funu da hat\u0131rlayabilirsiniz.<\/p>\n<div id=\"attachment_13387\" style=\"width: 2714px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27134026\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-6.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13387\" class=\"size-full wp-image-13387\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27134026\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-6.jpeg\" alt=\"CarPlay a\u00e7\u0131\u011f\u0131 \u00fczerinden bir araca ba\u015far\u0131l\u0131 s\u0131f\u0131r t\u0131klama sald\u0131r\u0131s\u0131\" width=\"2704\" height=\"1756\"><\/a><p id=\"caption-attachment-13387\" class=\"wp-caption-text\">AirBorne g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanarak CarPlay \u00f6zellikli bir ara\u00e7 bilgi-e\u011flence sistemini hacklemek. <a href=\"https:\/\/www.youtube.com\/watch?v=eq8bUwFuSUM\" target=\"_blank\" rel=\"nofollow noopener\">Kaynak<\/a><\/p><\/div>\n<h2>AirBorne sald\u0131r\u0131lar\u0131na kar\u015f\u0131 g\u00fcvende kalmak<\/h2>\n<p>Kendinizi AirBorne sald\u0131r\u0131lar\u0131ndan korumak i\u00e7in yapabilece\u011finiz en \u00f6nemli \u015fey, AirPlay \u00f6zellikli t\u00fcm cihazlar\u0131n\u0131z\u0131 g\u00fcncellemektir. \u00d6zellikle \u015funlar\u0131 yap\u0131n:<\/p>\n<ul>\n<li>iOS\u2019u 18.4 veya sonraki bir s\u00fcr\u00fcme g\u00fcncelleyin.<\/li>\n<li>macOS\u2019u Sequoia 15.4, Sonoma 14.7.5, Ventura 13.7.5 veya sonraki bir s\u00fcr\u00fcme g\u00fcncelleyin.<\/li>\n<li>iPadOS\u2019u 17.7.6 (eski iPad\u2019ler i\u00e7in), 18.4 veya sonraki bir s\u00fcr\u00fcme g\u00fcncelleyin.<\/li>\n<li>tvOS\u2019u 18.4 veya sonraki bir s\u00fcr\u00fcme g\u00fcncelleyin.<\/li>\n<li>visionOS\u2019u 2.4 veya sonraki bir s\u00fcr\u00fcme g\u00fcncelleyin.<\/li>\n<\/ul>\n<p>Ekstra bir \u00f6nlem olarak veya herhangi bir nedenle g\u00fcncelleme yapam\u0131yorsan\u0131z, a\u015fa\u011f\u0131dakileri yapmak da iyi bir fikirdir:<\/p>\n<ol>\n<li>Kullanmad\u0131\u011f\u0131n\u0131z zamanlarda cihazlar\u0131n\u0131zdaki AirPlay al\u0131c\u0131s\u0131n\u0131 devre d\u0131\u015f\u0131 b\u0131rak\u0131n. \u201cAirPlay\u201d aramas\u0131 yaparak gerekli ayar\u0131 bulabilirsiniz.\n<p><\/p><div id=\"attachment_13392\" style=\"width: 1180px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27135548\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-7-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13392\" class=\"size-full wp-image-13392\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27135548\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-7-1.png\" alt=\"\" width=\"1170\" height=\"2532\"><\/a><p id=\"caption-attachment-13392\" class=\"wp-caption-text\">AirBorne g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ailesinden yararlanan sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flamak i\u00e7in iOS\u2019ta AirPlay nas\u0131l yap\u0131land\u0131r\u0131l\u0131r?<\/p><\/div><\/li>\n<\/ol>\n<ol start=\"2\">\n<li>Her birinin AirPlay ayarlar\u0131ndan Apple cihazlar\u0131n\u0131za kimlerin yay\u0131n yapabilece\u011fini k\u0131s\u0131tlay\u0131n. Bunu yapmak i\u00e7in <em>Allow AirPlay for<\/em> \u00f6gesini <em>Current User<\/em> olarak ayarlay\u0131n. Bu, AirBorne sald\u0131r\u0131lar\u0131n\u0131 tamamen ortadan kald\u0131rmayacak, ancak onlar\u0131 ger\u00e7ekle\u015ftirmeyi zorla\u015ft\u0131racakt\u0131r.<\/li>\n<\/ol>\n<div id=\"attachment_13389\" style=\"width: 1664px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27134352\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-8.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13389\" class=\"size-full wp-image-13389\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/05\/27134352\/airborne-wormable-zero-click-vulnerability-in-apple-airplay-8.jpeg\" alt=\"AirBorne sald\u0131r\u0131lar\u0131na kar\u015f\u0131 koruma sa\u011flamak i\u00e7in macOS'ta AirPlay ayarlar\u0131\" width=\"1654\" height=\"1512\"><\/a><p id=\"caption-attachment-13389\" class=\"wp-caption-text\">AirBorne g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ailesinden yararlanan sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flamak i\u00e7in macOS\u2019ta AirPlay nas\u0131l yap\u0131land\u0131r\u0131l\u0131r?<\/p><\/div>\n<p>T\u00fcm cihazlar\u0131n\u0131za <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a>\u00a0y\u00fckleyin. Pop\u00fcler efsanenin aksine, Apple cihazlar\u0131 her \u015feye kar\u015f\u0131 korumal\u0131 de\u011fildir, bu cihazlar\u0131n da korunmaya ihtiyac\u0131 vard\u0131r.<\/p>\n<blockquote><p>Apple kullan\u0131c\u0131lar\u0131 ba\u015fka hangi g\u00fcvenlik a\u00e7\u0131klar\u0131yla kar\u015f\u0131la\u015fabilir? Sadece birka\u00e7 \u00f6rnek:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/\" target=\"_blank\" rel=\"noopener\">SparkCat truva at\u0131 h\u0131rs\u0131z\u0131 App Store ve Google Play\u2019e s\u0131zarak foto\u011fraflardan veri \u00e7al\u0131yor<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/banshee-stealer-targets-macos-users\/13135\/\" target=\"_blank\" rel=\"noopener\">Banshee: macOS kullan\u0131c\u0131lar\u0131n\u0131 hedef alan bir h\u0131rs\u0131zl\u0131k<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/gazeploit-how-to-steal-passwords-apple-vision-pro\/52267\/\" target=\"_blank\" rel=\"noopener nofollow\">Apple Vision Pro kullan\u0131c\u0131 parolalar\u0131 nas\u0131l g\u00f6zetlenir?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/macos-users-cyberthreats-2023\/11932\/\" target=\"_blank\" rel=\"noopener\">Mac\u2019ler g\u00fcvenli mi? MacOS kullan\u0131c\u0131lar\u0131na y\u00f6nelik tehditler<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/triangulation-attack-on-ios\/11476\/\" target=\"_blank\" rel=\"noopener\">\u00dc\u00e7genleme meselesi<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>AirPlay&#8217;de yeni ke\u015ffedilen g\u00fcvenlik a\u00e7\u0131klar\u0131; Apple cihazlar\u0131na ve di\u011fer AirPlay \u00f6zellikli \u00fcr\u00fcnlere, Wi-Fi \u00fczerinden s\u0131f\u0131r t\u0131klama sald\u0131r\u0131lar\u0131 da dahil olmak \u00fczere, \u00e7e\u015fitli sald\u0131r\u0131lar yap\u0131lmas\u0131na olanak tan\u0131yor.<\/p>\n","protected":false},"author":2726,"featured_media":13377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[969,14,744,790,750,2533,1170,1109,2783,537,2781,2782],"class_list":{"0":"post-13376","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-aciklar","9":"tag-apple","10":"tag-guvenlik","11":"tag-guvenlik-aciklari","12":"tag-ios","13":"tag-ipados","14":"tag-macos","15":"tag-saldirilar","16":"tag-sifir-tiklama","17":"tag-tehditler","18":"tag-tvos","19":"tag-visionos"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/13376\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/28878\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/24101\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/12446\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/28978\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/28143\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/30965\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/29677\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/39544\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/53443\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/22802\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/23814\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/32202\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/29154\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/34919\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/34550\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13376"}],"version-history":[{"count":9,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13376\/revisions"}],"predecessor-version":[{"id":13379,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13376\/revisions\/13379"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13377"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}