Apple's Silicon Macs are discovered to be exposed to a critical security flaw that cannot be patched. As the researchers note in their recent findings, this could pave the way for hackers to crack the device encryption.

It should be noted that this vulnerability is not limited to M1 chips. Even the M2 and M3 chips are affected. This is another challenge for the tech giant since it cannot be rectified through traditional patching methods.

Exploring the DMP Process

Researchers Discover Unpatchable Flaw in Apple Silicon Macs—Is Workaround Possible?
(Photo : Wes Hicks from Unsplash)
A new security flaw in the Apple M-series chip is discovered to be unpatchable. The Silicon Macs are not spared from being hijacked by threat actors with encryption keys.

According to 9to5Mac, the vulnerability stems from a component known as Data Memory-dependent Prefetchers (DMP), integral to the functionality of advanced chipsets. 

DMP enhances system performance by predicting memory addresses of data likely to be accessed, thereby reducing latency. However, a flaw in the DMP process compromises security by misinterpreting data as memory addresses, potentially exposing sensitive information.

Related Article: Apple Rushes to Patch Actively Exploited Vulnerabilities with iOS, macOS Security Updates

Unveiling the Security Risk

A team of researchers collaborated to unveil this vulnerability, culminating in the development of an exploit application named GoFetch. Through meticulous analysis, they identified that erroneous data interpretation by DMP could lead to the decryption of cryptographic keys over time. Despite the technical complexity, the flaw poses a tangible threat to device security.

DMP Vulnerability Has Been Around For a Few Years

This isn't the first instance of a DMP vulnerability within Apple Silicon. In 2022, a similar flaw named Augury was uncovered by a separate research team. These findings stress the persistent challenges associated with chip security and highlight the need why Apple should come up with a strong security method.

Is There a Workaround For This Unpatchable Flaw?

Given the unpatchable nature of the flaw, Apple faces limited options for mitigation. Proposed solutions, such as ciphertext blinding, offer some degree of protection but come at a considerable performance cost. Alternative measures, like running cryptographic processes on efficiency cores devoid of DMP, present trade-offs between security and system efficiency.

Assessing Real-World Risks

Despite the severity of the vulnerability, exploiting it requires significant effort and user interaction. Attackers must entice users to install malicious apps, which are typically blocked by default on Mac devices. Moreover, the lengthy duration of an attack, ranging from 54 minutes to 10 hours, diminishes the likelihood of successful exploitation in real-world scenarios.

Apple has been made aware of the vulnerability but has yet to implement any protective measures. The long-term solution lies in addressing the flaw at the chip design level in future iterations. 

Until then, users are advised to exercise caution when installing third-party applications and remain vigilant against potential security threats, per Ars Technica. It's always imperative to check the source of the software before anything else-to ensure that what you are downloading is a legitimate and safe app.

Read Also: Apple Antitrust: US DOJ Puts a Spotlight on iMessage's Green Bubbles, Lack of RCS

Joseph Henry

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion