.ezoic-wrapper img.wp-smiley, .ezoic-wrapper img.emoji .ezoic-wrapper #F8660_container img .ezoic-wrapper .
While we've heard no reports of this vulnerability actually being exploited, you certainly don't want to take the risk that it might be.
If you have an Air Port Express, Air Port Extreme or Air Port Time Capsule (with 802.11n or 802.11ac Wi-Fi), you'll want to download this firmware update right away. First, you'll want to be sure no one's accessing data through your Air Port devices.
Without firmware telling your gadgets what to do, they wouldn't work at all, and that's exactly what makes firmware security problems so serious.
Apple has been vague on the nature of the problem with its Air Port routers, only saying that "a memory corruption issue existed in DNS data parsing" which could allow an attacker to execute code on devices connected to your network.
If you intend to use our Dyn DNS Pro services with an Air Port or Time Capsule, you must use one of our Dyn Update Clients.
The Air Port Extreme, Air Port Express and Time Capsule devices do NOT use the Dyn HTTP Update API [IETF Draft] to dynamically update DNS servers.
If you use one (or more) of Apple's Air Port Wi-Fi routers you'll want to drop what you're doing and update their firmware immediately.
Until you update, a security vulnerability could leave your network open to attack—and, trust us, that's not something you want.
You probably don't think a lot about the firmware on your gadgets because it's more or less invisible.