Researchers Detect New Vulnerability in Apple’s CPUs
A newly identified flaw within Apple’s most recent chips could allow attackers to steal secret keys during cryptographic operations. This vulnerability stems from a side channel—a built-in aspect of the chip used during such operations.
On this page
A newly identified flaw within Apple's most recent chips could allow attackers to steal secret keys during cryptographic operations. This vulnerability stems from a side channel—a built-in aspect of the chip used during such operations.
To execute a successful attack, malicious software must be installed on the computer, followed by the execution of specific cryptographic functions. This vulnerability is not new and has a designated protective system in place. However, this system frequently malfunctions in Apple's processors, undermining established security protocols.
Notably, the malicious software does not require administrator rights to function; standard user permissions are sufficient. The duration of an attack can range from 50 minutes to 10 hours, as the malicious code is capable of evading even quantum-computer-resistant encryption.
While some view this exploit as too complex for widespread use against standard computers, addressing this issue would require Apple to release a software update potentially affecting the performance of its newest CPUs. Apple has not commented on these findings.
The content on The Coinomist is for informational purposes only and should not be interpreted as financial advice. While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, or reliability of any content. Neither we accept liability for any errors or omissions in the information provided or for any financial losses incurred as a result of relying on this information. Actions based on this content are at your own risk. Always do your own research and consult a professional. See our Terms, Privacy Policy, and Disclaimers for more details.