MacBook Vulnerability Found in Silicon M-series Chips, Can’t be patched now

Like and share

The MacBook vulnerability was found by academic researchers. An unpatched security flaw has been found in Apple’s Mac and MacBook laptops. This is the worst aspect of it.

What have researchers said about the MacBook vulnerability?

Researchers said: on Apple Macs equipped with Apple’s latest Silicon M-Series chipset, hackers can acquire confidential encryption keys. This covers the Apple MacBook and Mac computer models M1, M2, and M3.

Prefetchers, which are parts designed to predictably retrieve data before a request to speed up processing, are the problem because of the vulnerability they provide to malevolent actor assaults.

The assault, which the researchers have named “GoFetch,” is defined as “a microarchitectural side-channel attack that can extract secret keys via data memory-dependent prefetchers (DMPs) from constant-time cryptographic implementations.”

It will not be possible to remedy MacBook vulnerability problem because it is inherent in Apple’s semiconductors rather than its software. To fully address the issue, the manufacturer of iPhones would instead need to release entirely new CPUs.

The researchers that found the MacBook vulnerability recommend that Apple’s best bet would be to use workarounds to address it in the M1, M2, and M3 chips because it is not patchable.

These remedies would be software-based, requiring cryptographic software makers to incorporate mitigations such as ciphertext blinding, which modifies or adds masks to sensitive values (such as those found in encryption keys) before, during, or after they are loaded into or saved from memory.
Putting something like this into practice would seriously impair performance, which is the last thing that most Apple consumers would want. This is the main issue, though. Thankfully, it’s difficult to take advantage of this vulnerability.

Why wouldn’t you worry?


A hacker would first need to deceive an unwary Mac user into installing a malicious program on their machine to leverage this unpatched vulnerability in one of their assaults. In macOS with Gatekeeper, Apple restricts unsigned apps by default, which would make it much harder to install the malicious app required to carry out an attack.

Proceeding with this attack requires a significant amount of time. The researchers found that depending on the circumstances, it could take anything from nearly an hour to ten hours to complete, during which the malicious program would need to be running nonstop.

Although Apple has not yet responded to our inquiries about this unpatched MacBook vulnerability, if and when we update this article, it will be updated here. In the interim, the researchers advise keeping your Apple silicon-powered Macs software up-to-date and applying frequent upgrades from Apple as soon as they become available.

Photo by Sergey Zolkin on Unsplash


Like and share

Leave a Comment Cancel reply

Exit mobile version