Vulnerability found in Apple's Silicon M-series chips – and it can't be patched (2024)

A new security vulnerability has been discovered in Apple's Mac and MacBook computers – and the worst part is that it's unpatchable.

Academic researchers discovered the vulnerability, first reported by Ars Technica, which allows hackers to gain access to secret encryption keys on Apple computers with Apple's new Silicon M-Series chipset. This includes the M1, M2, and M3 Apple MacBook and Mac computer models.

Basically, this vulnerability can be found in any new Apple computer released from late 2020 to today.

What is the vulnerability?

The issue lies with prefetchers — components meant to predictively retrieve data before a request to increase processing speed — and the opening they leave for malicious attacks from bad actors.

Vulnerability found in Apple's Silicon M-series chips – and it can't be patched (1)Vulnerability found in Apple's Silicon M-series chips – and it can't be patched (2)

The researchers have dubbed the attack "GoFetch," which they describe as "a microarchitectural side-channel attack that can extract secret keys from constant-time cryptographic implementations via data memory-dependent prefetchers (DMPs)."

Mashable Light Speed

Want more out-of-this world tech, space and science stories?

Sign up for Mashable's weekly Light Speed newsletter.

By signing up you agree to our Terms of Use and Privacy Policy.

Thanks for signing up!

A side-channel attack is a type of cyber attack that uses extra information that's left vulnerable due to the design of a computer protocol or algorithm.

The researchers explained the issue in an email to Ars Technica:

Prefetchers usually look at addresses of accessed data (ignoring values of accessed data) and try to guess future addresses that might be useful. The DMP is different in this sense as in addition to addresses it also uses the data values in order to make predictions (predict addresses to go to and prefetch). In particular, if a data value "looks like" a pointer, it will be treated as an "address" (where in fact it's actually not!) and the data from this "address" will be brought to the cache. The arrival of this address into the cache is visible, leaking over cache side channels.

Our attack exploits this fact. We cannot leak encryption keys directly, but what we can do is manipulate intermediate data inside the encryption algorithm to look like a pointer via a chosen input attack. The DMP then sees that the data value "looks like" an address, and brings the data from this "address" into the cache, which leaks the "address." We don’t care about the data value being prefetched, but the fact that the intermediate data looked like an address is visible via a cache channel and is sufficient to reveal the secret key over time.

Basically, the researchers discovered that the DMPs in Apple's Silicon chipsets – M1, M2 and, M3 – can give hackers access to sensitive information, like secret encryption keys. The DMPs can be weaponized to get around security found in cryptography apps, and they can do so quickly too. For example, the researchers were able to extract an 2048-bit RSA key in under one hour.

Usually, when a security flaw is discovered nowadays, a company can patch the issue with a software fix. However, the researchers say this one is unpatchable because the issue lies with the "microarchitectural" design of the chip. Furthermore, security measures taken to help mitigate the issue would require a serious degradation of the M-series chips' performance.

Researchers say that they first brought their findings to Apple's attention on December 5, 2023. They waited 107 days before disclosing their research to the public.

Vulnerability found in Apple's Silicon M-series chips – and it can't be patched (2024)
Top Articles
Information for your Situation
Big global increase in outbound travel in 2023
Victor Spizzirri Linkedin
It's Official: Sabrina Carpenter's Bangs Are Taking Over TikTok
Was ist ein Crawler? | Finde es jetzt raus! | OMT-Lexikon
Plaza Nails Clifton
³µ¿Â«»ÍÀÇ Ã¢½ÃÀÚ À̸¸±¸ ¸íÀÎ, ¹Ì±¹ Ķ¸®Æ÷´Ï¾Æ ÁøÃâ - ¿ù°£ÆÄ¿öÄÚ¸®¾Æ
AB Solutions Portal | Login
Paketshops | PAKET.net
Autozone Locations Near Me
World Cup Soccer Wiki
Thotsbook Com
Gfs Rivergate
General Info for Parents
Michaels W2 Online
What is Cyber Big Game Hunting? - CrowdStrike
Hoe kom ik bij mijn medische gegevens van de huisarts? - HKN Huisartsen
Samantha Lyne Wikipedia
Craftology East Peoria Il
Haunted Mansion Showtimes Near Millstone 14
Vermont Craigs List
Csi Tv Series Wiki
Inter-Tech IM-2 Expander/SAMA IM01 Pro
China’s UberEats - Meituan Dianping, Abandons Bike Sharing And Ride Hailing - Digital Crew
Rs3 Eldritch Crossbow
Sef2 Lewis Structure
27 Paul Rudd Memes to Get You Through the Week
Macu Heloc Rate
Makemv Splunk
Is Holly Warlick Married To Susan Patton
2011 Hyundai Sonata 2 4 Serpentine Belt Diagram
Dashboard Unt
Wrights Camper & Auto Sales Llc
Top 20 scariest Roblox games
Ullu Coupon Code
Worthington Industries Red Jacket
Pipa Mountain Hot Pot渝味晓宇重庆老火锅 Menu
Craigslist Gigs Norfolk
Of An Age Showtimes Near Alamo Drafthouse Sloans Lake
Caderno 2 Aulas Medicina - Matemática
Bitchinbubba Face
Infinite Campus Farmingdale
O'reilly's Palmyra Missouri
Walgreens On Secor And Alexis
Ehc Workspace Login
Richard Mccroskey Crime Scene Photos
Every Type of Sentinel in the Marvel Universe
18 Seriously Good Camping Meals (healthy, easy, minimal prep! )
Koniec veľkorysých plánov. Prestížna LEAF Academy mení adresu, masívny kampus nepostaví
32 Easy Recipes That Start with Frozen Berries
Latest Posts
Article information

Author: Ouida Strosin DO

Last Updated:

Views: 6402

Rating: 4.6 / 5 (56 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Ouida Strosin DO

Birthday: 1995-04-27

Address: Suite 927 930 Kilback Radial, Candidaville, TN 87795

Phone: +8561498978366

Job: Legacy Manufacturing Specialist

Hobby: Singing, Mountain biking, Water sports, Water sports, Taxidermy, Polo, Pet

Introduction: My name is Ouida Strosin DO, I am a precious, combative, spotless, modern, spotless, beautiful, precious person who loves writing and wants to share my knowledge and understanding with you.