- cross-posted to:
- technology@lemmy.world
- technology@lemmy.ml
- cross-posted to:
- technology@lemmy.world
- technology@lemmy.ml
A newly discovered vulnerability baked into Apple’s M-series of chips allows attackers to extract secret keys from Macs when they perform widely used cryptographic operations, academic researchers have revealed in a paper published Thursday.
The flaw—a side channel allowing end-to-end key extractions when Apple chips run implementations of widely used cryptographic protocols—can’t be patched directly because it stems from the microarchitectural design of the silicon itself. Instead, it can only be mitigated by building defenses into third-party cryptographic software that could drastically degrade M-series performance when executing cryptographic operations, particularly on the earlier M1 and M2 generations. The vulnerability can be exploited when the targeted cryptographic operation and the malicious application with normal user system privileges run on the same CPU cluster.
The vulnerability is actually present in modern series chips as well, it’s just that they include an optional chip flag that cryptography libraries may leverage to disable the speculative processing that causes the leak.