+39 02 94750217 sales@tanaza.com

 

A vulnerability in Apple’s Airport Express Base Station could facilitate hackers taking control of your network. So if you have yet to update your firmware, we recommend you do so in order to prevent any risk of intrusion.

Apple announced a security vulnerability with the Airport Express Router which could lead to malware attacks. Apple stated that the “memory corruption issue [that] existed in DNS data parsing” could allow an attacker to execute code on devices connected to a network. Even if no reports of this vulnerability have been exploited so far, current users of the AirPort Express, AirPort Extreme or AirPort Time Capsule (with WiFi 4 or WiFi 5), should update their router firmware to prevent any risk of intrusion from hackers.

A vulnerability in Apple's Airport Express Base Station could facilitate hackers to take control of your network. If you have yet to update your firmware, we recommend you do so in order to prevent any risk of intrusion. - The AirPort Express Apple model (apple router).
Source: Apple website

Here’s how to quickly and easily update your router firmware:

  • Download the application AirPort Utility for iOS, OS X or Windows on the web.
  • The app will check for updates automatically when opened and will tell you if any of your devices have an update available.
  • To install the update, select your AirPort device and click “update.”
  • Updates are named 7.6.7 and 7.7.7 for the AirPort Express, AirPort Extreme, AirPort Time Capsule (with the WiFi 4), AirPort Extreme and AirPort Time Capsule (with the WiFi 5).

For those of you managing AirPort from your iPhone or iPad, the process is a little different: select the device, then “version,” then select “download and install.”

Now that your apple router is updated, you can surf the web worry-free! But remember, updating your firmware is key. So be sure to regularly look for the latest update.

 

Which Wi-Fi devices can be Tanaza Powered? CHECK THE LIST OF SUPPORTED MODELS


 

 

Related articles: 

Vulnerability of Netgear firmware used in multiple routers

D-Link’s security oversight of private keys on open source firmware