A vulnerability was found in the Apple M1 chip: two applications can secretly exchange data

Cybersecurity researcher Hector Martin discovered the first vulnerability in Apple M1 chips.

A flaw in the design of the chip allows any two applications running under the control of the system to exchange data without using memory, sockets, files, or other “normal” OS capabilities.

The programmer who discovered the error notes that during production the company decided to violate the ARM specifications by removing one of the required functions. The company may have believed that macOS would never need this component.

Since the vulnerability is at the hardware level, it cannot be fixed without a new chip revision with improvements. Devices already released and sold cannot be corrected.

Fortunately, the vulnerability poses a small threat, and Martin also considers it non-critical.

The company is aware of the M1 vulnerability. They believe that attackers will not be able to use it, since the data transfer process works exclusively within one PC and only when a special send command is initiated, and transmission to the external environment is impossible without the user’s permission.

If you have found a spelling error, please, notify us by selecting that text and pressing Ctrl+Enter.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Alexandr Ivanov earned his Licentiate Engineer in Systems and Computer Engineering from the Free International University of Moldova. Since 2013, Alexandr has been working as a freelance web programmer.
Function: Web Developer and Editor
E-mail: except.freene[email protected]
Alexandr Ivanov

Spelling error report

The following text will be sent to our editors: