A vulnerability was found in the Apple M1 chip: two applications can secretly exchange data

Cybersecurity researcher Hector Martin discovered the first vulnerability in Apple M1 chips.

A flaw in the design of the chip allows any two applications running under the control of the system to exchange data without using memory, sockets, files, or other “normal” OS capabilities.

The programmer who discovered the error notes that during production the company decided to violate the ARM specifications by removing one of the required functions. The company may have believed that macOS would never need this component.

Since the vulnerability is at the hardware level, it cannot be fixed without a new chip revision with improvements. Devices already released and sold cannot be corrected.

Fortunately, the vulnerability poses a small threat, and Martin also considers it non-critical.

The company is aware of the M1 vulnerability. They believe that attackers will not be able to use it, since the data transfer process works exclusively within one PC and only when a special send command is initiated, and transmission to the external environment is impossible without the user’s permission.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Author: John Kessler
Graduated From the Massachusetts Institute of Technology. Previously, worked in various little-known media. Currently is an expert, editor and developer of Free News.
Function: Director
135 number 0.220647 time