Friday, 5 September 2025
28.4 C
Singapore
32.6 C
Thailand
29.3 C
Indonesia
28.5 C
Philippines

Apple silicon vulnerability exposes encryption keys

Discover the recent vulnerability in Apple's M-series chips that allows encryption keys to leak and learn how to protect your device.

International researchers have unearthed a significant vulnerability in Apple’s M-series chips, which can leak encryption keys. This flaw, embedded within the chip’s microarchitectural design, cannot be patched traditionally. Instead, software-based mitigation strategies are necessary, potentially hampering performance. The technical nature of this discovery is best understood by delving into the detailed report by Ars Technica, but a simplified explanation is provided here for clarity.

Understanding the GoFetch attack

The crux of the issue lies in Apple Silicon’s data memory-dependent prefetcher (DMP). This component predicts which memory addresses will likely be needed by running code, enhancing efficiency. However, this predictive mechanism can be manipulated to unveil sensitive data, including encryption keys, through an attack dubbed GoFetch. The researchers’ groundbreaking insight revealed that while the DMP typically only dereferences pointers, attackers can craft inputs that, combined with cryptographic secrets, result in an intermediate state mimicking a pointer under specific conditions. This vulnerability enables the extraction of partial or complete information about the cryptographic secret, undermining the security of constant-time swap primitives and various cryptographic implementations designed to resist chosen-input attacks.

Historical context and mitigation

Interestingly, this is not the first instance of a DMP-related flaw in Apple Silicon; a similar vulnerability, the Augury flaw, was identified in 2022. Although the recent discovery may raise concerns, the practical risk is considered low. Gaining system access and the time required for an attack are significant barriers. Extracting a 2048-bit RSA key took the researchers just under an hour, whereas obtaining a 2048-bit Diffie-Hellman key took over two hours, and a Dilithium-2 key took more than ten hours.

Protecting your devices

Adhering to basic security practices is advisable for users seeking to safeguard their devices against such vulnerabilities. Keeping macOS Gatekeeper enabled and avoiding the installation of apps from unknown sources are essential steps in maintaining security.

In summary, while discovering this flaw in Apple’s M-series chips highlights potential security concerns, the immediate risk to users remains low, thanks to the demanding requirements for executing such an attack. Nonetheless, awareness and adherence to recommended security measures are crucial for protection.

Hot this week

GovWare 2025 returns to mark 10 years with Singapore International Cyber Week

GovWare 2025 marks 10 years with Singapore International Cyber Week, focusing on AI-driven threats and global cybersecurity cooperation.

Canon Singapore and NLB expand cartridge recycling programme with new green pledge

Canon Singapore and NLB expand cartridge recycling to more libraries with the Inkfinity Green Pledge, supporting Singapore’s Zero Waste goals.

Google Play Games to introduce new profiles with stats and social features

Google is introducing new Play Games profiles on Android, featuring gaming stats, achievements, and social tools, rolling out from 23 September.

Samsung’s newest SmartThings hub drops Z-Wave support

Samsung and Aeotec’s Smart Home Hub 2 drops Z-Wave support, focusing on Matter, Thread, and improved local automation.

Genshin Impact introduces the new Nod-Krai region in Version Luna I update launching 10 September

Genshin Impact Version Luna I launches on 10 September, adding Nod-Krai, new characters, mechanics and rewards to mark its fifth anniversary.

MOVA Z60 Ultra Roller Complete review: A robot vacuum that edges past the competition

The MOVA Z60 Ultra Roller Complete combines scrubbing mop power, strong suction, and pet-friendly AI for Singapore homes. With StepMaster threshold climbing and a self-cleaning dock, it delivers one of the most complete cleaning solutions today.

Kahoot!: Enabling the future of learning across APAC through AI, localisation and cross-sector engagement

Kahoot! expands in APAC with AI-powered tools, localised content, and a cross-sector strategy to meet the region’s evolving learning needs.

HubSpot unveils Loop Marketing playbook to drive growth in AI era

HubSpot launches Loop Marketing playbook and over 200 AI updates to help businesses grow in the era of AI search and zero-click results.

One in three Australian workers expose company data to AI platforms, Josys warns

Over a third of Australian workers upload sensitive data to AI tools, with Josys warning of rising risks from shadow AI and weak governance.

Related Articles

Popular Categories