ARM-based M1 chip, The first Apple-designed SoC developed Macs And the iPad Pro, has a security vulnerability that allows the two apps to exchange data right through secret channels. The weakness was found by mistake by the developer, Hector Martin, When he was working on porting Linux on M1. He says the error exists at the hardware level and software updates cannot fix it. Apple was notified about the issue prior to 0 days before the developer made the issue public and accepted it.
Hector, however, notes that this error is not a concern for users.
Here’s how the developer describes it:
An error in the design of the “Apple Silicon” M1 “chip allows any two applications running under the OS to exchange data between them, without the use of memory, sockets, files or any other common operating system features. Works under the level, creates a secret channel for confidential data exchange.
The vulnerability is baked in Apple silicon chips, and it can’t be fixed without new silicon modifications. “
Users don’t have to worry
This is because Apple seems to have violated the AMR specification requirement. Worst of all, advertising companies can use the blame for cross-app tracking. Users should not worry about the misuse of malware to take their devices or steal their data.
Martin also has a proof-of-concept video on its website that shows that the Covert Channel can be used to transfer enough data to stream video in real time with little data or some glitches.
Blame also affects IPhone 12 series It is powered by A14 Bionic, as both A14 and M1 are based on the same micro-architecture. The error is also expected to affect the M1X chip allegedly used in the upcoming MacBook Pro. This is likely to be fixed at a later iteration.