Apple users facing new security risks after critical USB component hacked

Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
(Image credit: Shutterstock)

  • Researcher uncovers method to hack the ACE3 USB-C Controller
  • This is a critical component used for charging and data transfer for Apple devices
  • Apple deemed the attack too complex to present a threat

The ACE3 USB-C controller, a proprietary Apple technology used for charging and data transfer for iPhones, Macs, and other devices, can be hacked to allow malicious actors to run unauthorized activities. Exploiting this vulnerability to do actual damage is a bit of a stretch, though.

At the recent 38th Chaos Communication Congress took place in Hamburg, Germany, white hat hacker Thomas Roth demonstrated hacking this critical component. He reverse-engineered the ACE3 controller, exposing the internal firmware and communication protocols. He then reprogrammed the controller, which gave him the ability to bypass security checks, inject malicious commands, and run other unauthorized actions.

Roth said the vulnerability stems from insufficient safeguards in the firmware of the controller, which would allow a threat actor to gain low-level access, then be used to emulate trusted accessories, and more.

Attack complexity

Roth said he notified Apple of the issue, but the company said the bug was too complex to exploit.

He seems to agree with this assessment, as speaking to Forbes, Roth said Apple, “saw the attack complexity and said that they don't see it as a threat - I agree with that sentiment but wanted to at least have reported it!”

“This is essentially foundational research, the first steps that are needed to find other attacks on the chip,” Roth concluded.

It doesn’t mean the security industry should completely ignore, or forget about Roth’s findings, as it could have major implications for Apple device security, since ACE3’s integrations with internal systems means compromising it could potentially lead to further attacks.

In any case, the Android ecosystem is not affected by this flaw.

Via SiliconANGLE

You might also like

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
An iPhone with a 10:30am alarm ringing next to an Apple Watch that displays the time as 12:42pm
Apple warns "extremely sophisticated attack" hits iPhones and iPads, so update now
An abstract image of a lock against a digital background, denoting cybersecurity.
Apple CPU security issue could let hackers steal user data from browsers
Security
Microsoft reveals more on a potentially major Apple macOS security flaw
A person at a laptop with a cybersecure lock symbol floating above it.
Parallels Desktop has some worrying security flaws for Mac users
Find My app logo displayed on an iPhone 11 screen
This Find My exploit lets hackers track any Bluetooth device – here’s how you can stay safe
A person in a wheelchair working at a computer.
Why betting on Mac security could put your organization at risk
Latest in Security
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedly left users exposed for months
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
AI tools.
Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware
Data leak
Top California sperm bank suffers embarrassing leak
An Android phone being held in the hand
These malicious Android apps were installed over 60 million times - here's how to stay safe
ransomware avast
Billions of credentials were stolen from businesses around the world in 2024
Latest in News
Stability AI 3D Video
Stability AI’s new virtual camera turns any image into a cool 3D video and I’m blown away by how good it is
The Google Wallet app with a mode for kids shown on-screen.
Google Wallet’s new kid-friendly payment system is a win for parents
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedly left users exposed for months
Vertere DG-X turntable on a pink/white TechRadar background
Vertere's elite DG X turntable is modular, expensive, and hugely desirable
Google Pixel 9a
Google is delaying the Pixel 9a to fix a mystery “component quality issue”
The bottom left corner of an Android phone, showing the Phone, Messages, Google icons and Google Search bar
Google Messages remote delete will soon save you from texting embarrassment – and here's how it works