A VULNERABILITY has been discovered in some Apple products – and it could affect your devices.
The security flaw was discovered by researchers at the Massachusetts Institute of Technology.
The flaw could affect Apple devices ranging from MacBooks to iPads, researchers said.
Apple products have M1 chips, also known as pointer authentication codes, or PAC for short.
These PACs check digital signatures to make sure that codes have not been changed by malware or viruses.
But the security flaw has been found in the M1 chips.
READ MORE APPLE STORIES
iPhone warning over ‘battery killer’ feature that may be draining your charge
These chips power products like MacBooks and iPads, among other products.
However, researchers at MIT designed a software tool that can potentially bypass the security flaw in the M1 chips.
PACMAN, as the exploit is called, uses software and hardware to test codes.
There are a finite number of possible codes, meaning the PACMAN software can try them all to find the valid one.
Most read in Tech
iPhone warning over 'battery killer' feature that may be draining your charge
Inside Apple plot to KILL the password forever – and it's happening this year
I’m a Google engineer – our AI bot came to LIFE and says it's 'scared of death'
Amazing free iPhone hack gives you instant upgrade – don't wait to claim it
Then, a separate software tool can use the valid code to bypass the defense mechanism contained in the M1 chip.
"The idea behind pointer authentication is that if all else has failed, you still can rely on it to prevent attackers from gaining control of your system," MIT Ph.D. student Joseph Ravichandran told TechRadar.
"We've shown that pointer authentication as a last line of defense isn't as absolute as we once thought it was."
The security flaw doesn't necessarily put anyone's device at immediate risk.
Apple said in a statement to TechRadar that there is no "immediate risk" to users.
Read More On The Sun
Khloe Kardashian reveals how Kim REALLY feels about Pete Davidson
"We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these techniques," a company spokesperson told TechRadar.
"Based on our analysis as well as the details shared with us by the researchers, we have concluded this issue does not pose an immediate risk to our users and is insufficient to bypass operating system security protections on its own."
Source: Read Full Article