Apple M1: the chip suffers from a security flaw that cannot be corrected

Apple M1

Scientists at MIT Computer Science & Artificial Intelligence Laboratory (CSAIL) have unveiled a new attack methodology that exploits a hardware vulnerability in Apple’s M1 series of chips by using a new PACMAN technique to steal data. This flaw could theoretically allow malicious actors to gain full access to the core operating system kernel.

Indeed, the researchers say the attack can potentially allow access to the operating system kernel; giving attackers full control of a system through a combination of software and hardware attacks.

“PACMAN” is an attack capable of finding the correct value to pass pointer authentication; so that a hacker can continue to access the computer. Pointer authentication is a security feature that helps protect the central processing unit against an attacker who has gained access to memory. Pointers store memory addresses, and Pointer Authentication Code (PAC) checks for unexpected pointer changes caused by an attack.

Apple M1 chip has a security weakness

Apple M1 chip

Gizchina News of the week

“The idea behind pointer authentication is that if all else fails, you can still rely on it to prevent attackers from taking over your system,” said Joseph Ravichandran, one of the co-authors. of the paper. The MIT team has therefore discovered a method exploiting speculative execution techniques to bypass pointer authentication, and thus break the last line of defense available to Apple’s chips.

Unfortunately for the American manufacturer, this attack demonstrates that hackers can thwart the pointer authentication without leaving a trace. Unlike previous M1 chip software flaws, this one uses a hardware mechanism, so no software patch can fix it.

Shortly after the article was published, Apple was quite confident. “Based on our analysis as well as the details shared with us by the researchers; we have concluded that this issue poses no immediate risk to our users; and is insufficient to bypass system security protections”. According to Apple, Mac users therefore should not fear for their devices from hacking.

Disclaimer: We may be compensated by some of the companies whose products we talk about, but our articles and reviews are always our honest opinions. For more details, you can check out our editorial guidelines and learn about how we use affiliate links.

Source/VIA :
Previous OnePlus 10T/10 smartphone design with 150W charging revealed
Next WhatsApp groups can now have 512 users