“Cannot be patched”: Vulnerability discovered in Apple chips

class = “sc-cffd1e67-0 iQNQmc”>

1/5
There is a security vulnerability in Apple’s M1, M2 and M3 processors.
0085Blick_Portraits (13-28-07).jpg
Tobias BolzernEditor Digital

Security vulnerabilities in processors are a disaster for manufacturers. In 2018, Specter and Meltdown vulnerabilities in Intel, AMD and ARM processors made headlines around the world. Billions of devices were at risk.

Now, a report on Apple processors by a team of researchers from several American universities is making people sit up and take notice. They discovered a critical vulnerability in M-series chips that allows attackers to obtain cryptographic keys. The vulnerability is called Gofetch. Apple uses M1, M2 and M3 processors in Macs and some iPads. This means potentially millions of devices are affected.

More information about vulnerabilities
100,000 Internet provider routers unprotected on network
IT specialist sounds the alarm
100,000 Internet provider routers unprotected on network
“They stole my WhatsApp account while I was sleeping”
Attack on Blick reader
“They stole my WhatsApp account while I was sleeping”
“People are the biggest weakness of an IT system”
IT security in Swiss SMEs
“The biggest weakness in information systems is people.”
One call is all it takes to hack your WhatsApp account
Federal government warns of attack
One call is all it takes to hack your WhatsApp account
German hackers hacked Tesla and explained how
Security vulnerability detected
German hackers hacked Tesla and explained how

The most sensitive data is at risk

Mashable.com writes that, in principle, the vulnerability is present in all Apple computers released between the end of 2020 and today. The consequences of this are serious. Gofetch allows attackers to bypass encryption and access the user’s most sensitive data.

The discovered vulnerability is based on an optimization function of the chips called Data Memory Dependent Prefetcher (DMP). This aims to improve the performance of the chips by allowing DMP to predict what data will be needed in the near future and then load that data into the CPU cache. It was now possible to take full advantage of this prediction.

Who was affected?

Researchers have shown that they can read complex cryptographic keys for encryption with an effort of anywhere from 30 minutes to 14 hours. According to researchers, Apple was notified of this vulnerability on December 5, 2023.

So who exactly is affected by this gap? “This is primarily a problem for servers (with TLS) or organizations where users encrypt their information. “In principle, any organization using Apple processors and using encryption should be worried,” an IT expert explains to scmagazine.com.

Advert

Problem: In an email to specialist journal arstechnica.com, researchers explain that the fix is ​​not easy because the problem lies in the architecture of the chip. Additionally, security measures that can help resolve the issue will also affect the performance of M series chips.

Cheating can solve the problem

But there is also good news. On the one hand, a lot of technical know-how is required to exploit this vulnerability. On the other hand, techradar.com explains that in the case of Gofetch, the drop in performance only affects encryption functions, so this shouldn’t be a big problem for most users.

As Theregister.com explains, there may already be a temporary solution. According to the magazine, M chips have two types of cores: Firestorm and Icestorm. Gofetch only works with Firestorm. In particular, this means that if the encryption functions are ported to Icestorm, the problem will be solved. This also affects performance but not security. The relevant request from Blick to Apple is still pending.

Source :Blick

follow:
Tim

Tim

I'm Tim David and I work as an author for 24 Instant News, covering the Market section. With a Bachelor's Degree in Journalism, my mission is to provide accurate, timely and insightful news coverage that helps our readers stay informed about the latest trends in the market. My writing style is focused on making complex economic topics easy to understand for everyone.

Related Posts