Apple M1 chip has an ‘unpatchable’ security flaw, but don’t panic just yet


The Apple M1 chip has been a wildly successful release for the Cupertino tech giant, but new research from MIT says that the chip powering everything from the Apple MacBook Pro to the latest iPad Air has a major security flaw that by its nature cannot be fixed in a security update.
The flaw was exposed in a new paper from MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) (opens in new tab) researchers and exploits something known as pointer authentification code (PAC). Essentially, PAC works by checking a digital signature to ensure that a program’s code hasn’t been changed maliciously.
PACMAN, the exploit that the MIT researchers designed, relies on a combination of software and hardware exploits that test whether a signature is accepted, and since there are only a finite number of possible signatures, it is possible for PACMAN to try them all, find out which one is valid, and then have a separate software exploit use that signature to bypass this final defense mechanism in the M1 chip.
The researchers tested this exploit against the system’s kernel – the foundation of any operating system – and found that the exploit gave them kernel-level system access, meaning that it could give an attacker complete control over a system.
“The idea behind pointer authentication is that if all else has failed, you still can rely on it to prevent attackers from gaining control of your system,” said MIT CSAIL We’ve shown that pointer authentication as a last line of defense isn’t as absolute as we once thought it was,” said MIT CSAIL Ph.D. student Joseph Ravichandran, a co-lead author of the paper explaining the flaw, which will be presented to the International Symposium on Computer Architecture on June 18th.
“When pointer authentication was introduced, a whole category of bugs suddenly became a lot harder to use for attacks. With PACMAN making these bugs more serious, the overall attack surface could be a lot larger,” Ravichandran added.
And since the researchers used a microarchitecture exploit to bypass the PAC security measure, there is no way to “patch” this part of the exploit since it is literally hardwired into the chip itself. Still, the exploit can only work in conjunction with another software exploit. It can’t do anything on its own.
Analysis: This sounds bad, but is it?
While this sounds like a serious problem, and it can be, it doesn’t mean that everyone’s new MacBook Air is open to any cybergang that wants to extort some bitcoin out of people.
The hardware exploit that the researchers used in this case is similar to the Spectre and Meltdown exploits seen in some Intel chips, and while those were a problem, it did not suddenly destroy everyone’s computers. The fact is that the vast majority of people are not worth a cybercriminal’s time. Why mess with your laptop when someone can lock up an oil pipeline and extort millions of dollars?
Plus, the PAC exploit attacks the last line of defense on an M1 chip (and not just M1 chips, but also any ARM-based processor that uses a PAC security measure, implicating some Qualcomm and Samsung chips as well).
“We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these techniques,” an Apple spokesperson told TechRadar. “Based on our analysis as well as the details shared with us by the researchers, we have concluded this issue does not pose an immediate risk to our users and is insufficient to bypass operating system security protections on its own.”
This doesn’t mean that such an exploit can’t be used, but it means that an exploit will have to overcome every other security measure in the system, and Apple systems are fairly well-secured as it is. So while we’re pretty sure that Apple will fix this issue in chips going forward, Apple M1 users don’t necessarily need to panic over this exploit, especially if they take other preventative safety measures.
Audio player loading… The Apple M1 chip has been a wildly successful release for the Cupertino tech giant, but new research from MIT says that the chip powering everything from the Apple MacBook Pro to the latest iPad Air has a major security flaw that by its nature cannot be…
Recent Posts
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010