The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-27867

CVE-2024-27867: Apple AirPods Auth Bypass Vulnerability

CVE-2024-27867 is an authentication bypass flaw in Apple AirPods Firmware that allows attackers in Bluetooth range to spoof paired devices and gain unauthorized access. This article covers technical details, impact, and fixes.

Updated: January 22, 2026

CVE-2024-27867 Overview

CVE-2024-27867 is an authentication bypass vulnerability affecting Apple AirPods, AirPods Pro, AirPods Max, Beats Fit Pro, and Powerbeats wireless audio devices. The vulnerability stems from improper state management in the Bluetooth authentication process, allowing an attacker within Bluetooth range to spoof a previously paired device and gain unauthorized access to the target headphones.

When affected headphones are actively seeking a connection request to one of the user's previously paired devices, an attacker positioned within Bluetooth range can impersonate the legitimate source device. This exploitation allows the attacker to establish an unauthorized connection, potentially enabling eavesdropping on audio communications or injecting audio content.

Critical Impact

Attackers within Bluetooth range can spoof trusted devices and gain unauthorized access to Apple wireless headphones during the connection handshake phase, potentially compromising audio communications and privacy.

Affected Products

  • Apple AirPods (2nd generation and later) with firmware prior to 6A326
  • Apple AirPods Pro (all models) with firmware prior to 6A326/6F8
  • Apple AirPods Max with firmware prior to 6A326/6F8
  • Apple Beats Fit Pro with firmware prior to 6F8
  • Apple Powerbeats Pro with firmware prior to 6F8

Discovery Timeline

  • 2024-06-26 - CVE-2024-27867 published to NVD
  • 2024-12-10 - Last updated in NVD database

Technical Details for CVE-2024-27867

Vulnerability Analysis

This authentication bypass vulnerability (CWE-287) exists in the Bluetooth pairing and reconnection logic of Apple's wireless audio device firmware. The flaw allows an attacker to exploit the device during the window when headphones are actively seeking connections to previously paired devices.

The attack requires physical proximity to the target device, as Bluetooth operates within a typical range of approximately 10 meters (33 feet), though this can extend further with specialized equipment. The attack can be conducted without any user interaction and does not require prior authentication, making it particularly concerning for users in public spaces or shared environments.

The vulnerability enables unauthorized information disclosure, as attackers could potentially monitor audio streams or microphone data being transmitted through the compromised connection. While the immediate impact is limited to confidentiality concerns, the nature of audio devices means sensitive conversations could be intercepted.

Root Cause

The root cause of CVE-2024-27867 lies in inadequate state management within the Bluetooth authentication mechanism. During the connection establishment phase, the firmware fails to properly validate and verify the identity of devices claiming to be previously paired. This allows an attacker to craft spoofed connection requests that mimic legitimate trusted devices.

The vulnerability specifically manifests when the headphones transition from an idle state to actively seeking a connection with known devices. During this state transition, the authentication checks can be bypassed by presenting crafted Bluetooth identifiers that match those of legitimate paired devices.

Attack Vector

The attack exploits the adjacent network (Bluetooth) attack vector, requiring the attacker to be within wireless range of the target device. The attack flow proceeds as follows:

  1. The attacker identifies target AirPods or Beats headphones in pairing/connection mode
  2. The attacker monitors Bluetooth traffic to identify the MAC addresses and identifiers of previously paired devices
  3. The attacker spoofs the identity of a trusted paired device by crafting malicious Bluetooth packets
  4. The headphones accept the spoofed connection request due to improper state validation
  5. The attacker gains unauthorized access to the audio device, potentially enabling eavesdropping or audio injection

The attack requires no user interaction and can be performed silently without alerting the victim. Tools for Bluetooth packet capture and spoofing are readily available, lowering the technical barrier for exploitation.

Detection Methods for CVE-2024-27867

Indicators of Compromise

  • Unexpected or unauthorized Bluetooth connections appearing in paired device lists
  • Audio interruptions or unexplained disconnections from legitimate paired devices
  • Reports of hearing unexpected audio or experiencing microphone activation without user initiation
  • Multiple rapid connection/disconnection events in Bluetooth logs

Detection Strategies

  • Monitor enterprise mobile device management (MDM) solutions for firmware version compliance on Apple audio accessories
  • Implement Bluetooth traffic analysis in high-security environments to detect spoofing attempts
  • Establish baseline Bluetooth connection patterns and alert on anomalous behavior
  • Deploy network-level Bluetooth monitoring in sensitive facilities to detect rogue device activity

Monitoring Recommendations

  • Enable automatic firmware updates for all Apple audio accessories through connected iOS/macOS devices
  • Conduct regular audits of paired Bluetooth devices on user equipment to identify unauthorized pairings
  • Implement security awareness training regarding the risks of using wireless audio devices in sensitive environments
  • Consider deploying Bluetooth intrusion detection systems in high-security areas

How to Mitigate CVE-2024-27867

Immediate Actions Required

  • Update AirPods (2nd generation and later) to firmware version 6A326 or later
  • Update AirPods Pro (all models) to firmware version 6A326 or 6F8
  • Update AirPods Max to firmware version 6A326 or 6F8
  • Update Beats Fit Pro and Powerbeats Pro to firmware version 6F8
  • Verify firmware versions through iOS Settings > Bluetooth > [Device] > About

Patch Information

Apple has released firmware updates to address this vulnerability with improved state management in the Bluetooth authentication process. The patches are available through the following firmware versions:

  • AirPods Firmware Update 6A326 - For AirPods 2nd generation and later
  • AirPods Firmware Update 6F8 - For AirPods Pro and AirPods Max
  • Beats Firmware Update 6F8 - For Beats Fit Pro and Powerbeats Pro

Firmware updates are delivered automatically when the audio devices are connected to an iOS or macOS device with an internet connection. Users can verify the current firmware version and manually trigger updates by placing the devices in their charging case near the paired iPhone or iPad. For detailed update instructions, refer to the Apple Support Article.

Workarounds

  • Disable Bluetooth on paired devices when in untrusted environments to prevent automatic connection attempts
  • Keep AirPods/Beats in their charging case when not in active use to prevent unauthorized pairing attempts
  • Remove unknown or suspicious devices from the Bluetooth paired devices list regularly
  • Avoid using vulnerable audio devices for sensitive communications until firmware updates are applied
  • Consider using wired audio alternatives in high-security environments until patching is complete
bash
# Verify AirPods/Beats firmware version on macOS
# Open System Settings > Bluetooth > Click (i) next to device name
# Or use System Information
system_profiler SPBluetoothDataType | grep -A 10 "AirPods\|Beats"

# On iOS: Settings > Bluetooth > Tap (i) next to device > About
# Ensure firmware version is 6A326 or 6F8 depending on device model

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechApple Airpods

  • SeverityMEDIUM

  • CVSS Score4.3

  • EPSS Probability0.08%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-287
  • Technical References
  • Full Disclosure Announcement
  • Vendor Resources
  • Apple Support Article

  • Apple Knowledge Base Article
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English