Skip to main content
Answered

Are Sonos products affected by the Airborne AirPlay exploit?

  • May 6, 2025
  • 21 replies
  • 531 views

As per the Oligo Airborne announcement, some high level exploits using AirPlay have been made public.  Tow of them - CVE-2025-24132 & CVE-2025-30422  affects Speakers and Receivers made with AirPlay SDK. Can someone from Sonos comment on whether Sonos products are susceptible to exploits, and if so, when they will be patched, and any products that may not be patched?

thanks,

Rob

Best answer by Corry P

Hi ​@gh208 

Thanks for bringing this particular thread back to my attention.

Yes, with yesterdays update, the Airplay vulnerability was patched on Sonos systems.

This topic has been closed for further comments. You can use the search bar to find a similar topic, or create a new one by clicking Create Topic at the top of the page.

21 replies

Airgetlam
  • 44829 replies
  • May 6, 2025

I haven’t had anybody else on my WiFi to check. Since it would require that access to my password protected WiFi, it really seems like if there is any threat at all, it’s super low. 


  • Lyricist I
  • 1 reply
  • May 6, 2025

It’s not about the wifi password 🤦‍♀️If you have devices on your network that could be infected elsewhere (like iPhones and iPads either yours or guests) they could infect your Sonos devices. That would suck. Hopefully we can expect a patch in less time they are taking to bring back missing features to the app 😉

 


Airgetlam
  • 44829 replies
  • May 6, 2025

I’m not sure you read the link about the exploit. 


  • Lyricist III
  • 8 replies
  • May 7, 2025

I haven’t had anybody else on my WiFi to check. Since it would require that access to my password protected WiFi, it really seems like if there is any threat at all, it’s super low. 

 

That is indeed the case for most home users, however Sonos are extensively used in various sizes of businesses, specifically within customer facing environments (like stores) where deployments can be less than secure.

Sonos really need to provide clear information to its users, hopefully Sonos Devices are not subject to the Airborne vulnerabilities.  I suspect this isn’t the case, given the broad nature of the SDK guidance and that nothing is within any Sonos release notes to address the issue.

This is the minimum that Sonos could do.


controlav
Forum|alt.badge.img+24
  • Lead Maestro
  • 7890 replies
  • May 7, 2025

Although Apple have updated their own products, my understanding is that they only updated the AirPlay SDK that third parties use last month, so it may take a while for those changes to make it to Sonos devices.

However, as Bruce says, the risk is limited to those that already have access to your local network.


AjTrek1
  • 7385 replies
  • May 7, 2025

As far as cell phones and tablets are concerned the best option is to stay away from public hot spots like Starbucks, Airports and the like. As for visitors to your home limit them to a Guess network.


  • Lyricist III
  • 8 replies
  • May 8, 2025

Speaking from the point of view of a cyber security professional with experience from the 1990’s, this is a problematic topic that isn’t so simple.  Sonos device aren’t just used by consumers or home offices, they are extensively deployed into many small businesses and also larger enterprises.  

Consider a hotel network, where the devices are installed for guest use.  
Consider the Smart TV with Airplay in a conference room that also has Sonos for audio 

Just two scenarios off the top of my head that require rather open access to visitors, that could yield highly negative outcomes.  

 

The five CVEs involved in this CVE-2025-24252, 24206, 24132 & 24271 are all recognised as a severity of critical.  With recommendations to either patch, or if unable to turn off airplay, block network ports TCP 5000, 7000, 7100, 3689 & UDP 5353.

 

Now as to allowing enough time, Sonos should have already patched this (and might have well have already patched), or at least offering guidance to users.  Guidance that is lacking at this point.

https://www.sonos.com/en-us/security-advisory
 


Forum|alt.badge.img+17
  • Local Superstar
  • 906 replies
  • May 8, 2025


Consider a hotel network, where the devices are installed for guest use.  
Consider the Smart TV with Airplay in a conference room that also has Sonos for audio 

Consider that Apple has already patched the vulnerabilities, and vast majority of Apple consumers will have updated their Apple devices, so risk is significantly reduced in your scenario. Also, I would expect that the hotel and enterprise networks are guest isolated for guests and visitors.


  • Lyricist III
  • 8 replies
  • May 8, 2025


Consider a hotel network, where the devices are installed for guest use.  
Consider the Smart TV with Airplay in a conference room that also has Sonos for audio 

Consider that Apple has already patched the vulnerabilities, and vast majority of Apple consumers will have updated their Apple devices, so risk is significantly reduced in your scenario. Also, I would expect that the hotel and enterprise networks are guest isolated for guests and visitors.

I don’t think you understand a key element here, apples code actually runs as part of the Sonos speaker as the Airplay receiver, making the Sonos devices “possibly” at risk without any requirement for other apple devices.  And as network devices that run 24x7, this zero day and zero click vulnerability is a massive security hole.

It really doesn’t matter where the devices are deployed, Sonos needs to urgently advise customers if the devices are at risk, what do to in the interim and when they will fix (if required).  Not sure what the argument about this point is, does anyone think that Sonos should’t be advising?


Forum|alt.badge.img+17
  • Local Superstar
  • 906 replies
  • May 8, 2025

Of course I understand that all AirPlay devices are running Apple SDK. I am trying to understand the level of ‘risk’ your scenarios, EPSS is 0.02% probability of the CVE’s you listed being exploited in next 30 days. I don’t see how this is a ‘massive security hole’?

I don't think its normal for software vendors to announce they have potential low risk vulnerabilities before an update is available.


Corry P
Forum|alt.badge.img+19
  • Sonos Staff
  • 9154 replies
  • May 8, 2025

Hi ​@robzr 

Welcome to the Sonos Community!

Sonos takes customer security very seriously. We are aware of a recently disclosed vulnerability related to Apple AirPlay and are actively working to ensure our implementation includes the latest security updates from Apple. As a general best practice, we recommend ensuring your Sonos system is connected to a private, trusted WiFi network.

I hope this helps.


  • Lyricist II
  • 4 replies
  • May 29, 2025

Hello Sonos,

Any updates on the Airborne issue? I’m staying in a hotel right now, and from my room I can see hundreds of AirPlay device, TVs and Sonos speakers included.

Would be good to know that people can’t use Sonos devices as a bridge into the network. I’m glad I travel with a pocket router, but even that is getting port scanned as I write this.

Please advise.


Corry P
Forum|alt.badge.img+19
  • Sonos Staff
  • 9154 replies
  • May 29, 2025

Hi ​@gh208 

As I understand it, with a travel router in use you will be fine.

I hope this helps.


  • Lyricist II
  • 4 replies
  • May 29, 2025

True, I am fine, while I am in my hotel room and behind my router.  Anyone who isn’t behind their own router might not be. I have a very small substack that I would love to inform that their Sonos is ok now. I know a lot of people that have turned off Airplay on their devices (like Roku) but this is not something that we can do on Sonos.


Corry P
Forum|alt.badge.img+19
  • Sonos Staff
  • 9154 replies
  • May 29, 2025

Hi ​@gh208 

Anyone who isn’t behind their own router might not be.

Hence my earlier statement:

As a general best practice, we recommend ensuring your Sonos system is connected to a private, trusted WiFi network.

 

 


  • Lyricist II
  • 4 replies
  • May 29, 2025

Hi Corry,

Can you please just provide a clear update?

Most people, including me, connect their Sonos speakers to a private, trusted Wi-Fi network. At least, it was trusted until we added a Sonos device. Until we know Sonos has patched the Airborne vulnerability that Apple addressed with the updated SDK, how can we treat the device as trusted?

So again, to repeat the original question that still hasn’t been answered:

Apple released an updated SDK about a month ago. Has Sonos implemented the fix for the Airborne vulnerability?

Appreciate a straight answer.

 


Corry P
Forum|alt.badge.img+19
  • Sonos Staff
  • 9154 replies
  • May 29, 2025

Hi ​@gh208 

Apple released an updated SDK about a month ago. Has Sonos implemented the fix for the Airborne vulnerability?

No.


  • Lyricist I
  • 1 reply
  • June 7, 2025

Hi ​@gh208 

Apple released an updated SDK about a month ago. Has Sonos implemented the fix for the Airborne vulnerability?

No.

Why does it take so long for Sonos to implement this fix? It is pretty ridiculous actually. We have Sonos speakers in our office, and because of security policy we had to turn them off. We basically bought expensive speakers that we are now unable to use for over a month! We are getting to the point that we’re thinking of throw them away, burn them and never look back to Sonos again! It is utterly disrespectful to have such complete lack of care about your customers security. 

Dear Sonos, Fix this ASAP!


106rallye
Forum|alt.badge.img+18
  • 6600 replies
  • June 7, 2025

All I’ve read is that to exploit this vulnerability the attacker needs to be on your network. For consumers this is not a big problem. I would not know if implementing this fix is hard, so I cannot say if Sonos is taking a long time to implement this.

You are using consumer products in a work environment, which will bring up such consequences.


  • Lyricist II
  • 4 replies
  • June 10, 2025

Hello Corry P and Sonos!

My Sonos just applied an update.  Can you please confirm if this update includes the Airborne vulnerability fixes?

Thank you.


Corry P
Forum|alt.badge.img+19
  • Sonos Staff
  • 9154 replies
  • Answer
  • June 11, 2025

Hi ​@gh208 

Thanks for bringing this particular thread back to my attention.

Yes, with yesterdays update, the Airplay vulnerability was patched on Sonos systems.