🌋 Researchers Detect New Vulnerability in Apple's CPUs
posted 22 Mar 2024
A newly identified flaw within Apple's most recent chips could allow attackers to steal secret keys during cryptographic operations. This vulnerability stems from a side channel—a built-in aspect of the chip used during such operations.
To execute a successful attack, malicious software must be installed on the computer, followed by the execution of specific cryptographic functions. This vulnerability is not new and has a designated protective system in place. However, this system frequently malfunctions in Apple's processors, undermining established security protocols.
Notably, the malicious software does not require administrator rights to function; standard user permissions are sufficient. The duration of an attack can range from 50 minutes to 10 hours, as the malicious code is capable of evading even quantum-computer-resistant encryption.
While some view this exploit as too complex for widespread use against standard computers, addressing this issue would require Apple to release a software update potentially affecting the performance of its newest CPUs. Apple has not commented on these findings.