Trusted Reviews is supported by its audience. If you purchase through links on our site, we may earn a commission. Learn more.

Apple’s M1 chip has ‘unpatchable’ flaw, but you probably shouldn’t worry

Apple has responded to reports of an ‘unpatchable’ vulnerability within the M1 processors that powers the company recent MacBook laptops and Mac computers.

Researchers at the Massachusetts Institute of Technology (MIT) say the “last line of security” for Apple Silicon hardware can potentially be bypassed.

Scientists at MIT’s Computer Science & Artificial Intelligence Laboratory found a vulnerability pertaining to the hardware-level pointer authentication codes (PAC), which Apple uses to ensure programmes attempting to execute code are safe.

The MIT boffins have found a way to bypass this with a device that guesses the PAC continually, until it finds the right key. They’re calling it a ‘PACMAN’ attack.

In the research paper published this week, the paper’s lead co-author Ph.D. student Joseph Ravichandran wrote: “The idea behind pointer authentication is that if all else has failed, you still can rely on it to prevent attackers from gaining control of your system. We’ve shown that pointer authentication as a last line of defence isn’t as absolute as we once thought it was.”

“When pointer authentication was introduced, a whole category of bugs suddenly became a lot harder to use for attacks. With PACMAN making these bugs more serious, the overall attack surface could be a lot larger,” he added.

They researchers do say there is “no immediate call for alarm” because there needs to be a myriad of other breakages in order to for this ‘last line of defence’ to be cracked. The researchers presented their findings to Apple, who responded with a statement to TechCrunch.

An Apple spokesperson said: “We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these techniques. Based on our analysis as well as the details shared with us by the researchers, we have concluded this issue does not pose an immediate risk to our users and is insufficient to bypass operating system security protections on its own.”

Why trust our journalism?

Founded in 2003, Trusted Reviews exists to give our readers thorough, unbiased and independent advice on what to buy.

Today, we have millions of users a month from around the world, and assess more than 1,000 products a year.

author icon

Editorial independence

Editorial independence means being able to give an unbiased verdict about a product or company, with the avoidance of conflicts of interest. To ensure this is possible, every member of the editorial staff follows a clear code of conduct.

author icon

Professional conduct

We also expect our journalists to follow clear ethical standards in their work. Our staff members must strive for honesty and accuracy in everything they do. We follow the IPSO Editors’ code of practice to underpin these standards.

Trusted Reviews Logo

Sign up to our newsletter

Get the best of Trusted Reviews delivered right to your inbox.

This is a test error message with some extra words