Unpatchable Bug in Apple’s M1, M2, and M3 Chipsets

Shahab Hasan
3 min readMar 28, 2024

In the vast and intricate world of computer security, a groundbreaking discovery has once again underscored the fragility of digital fortresses we’ve come to rely on. At the heart of this revelation is a critical bug found within Apple’s esteemed M1, M2, and M3 chipsets, components central to the performance and efficiency of the latest Apple computers. This flaw, inherent in the silicon design of these CPUs, presents a chilling reality: it is unpatchable by conventional software updates, suggesting that a physical replacement of the CPU is the only remedy.

Before diving into the complexities of this bug, it’s crucial to clarify that this vulnerability requires local access to exploit. In other words, an attacker must have physical access to the device in question, a silver lining that mitigates immediate widespread concern among users.

Photo by Dmitry Chernyshov on Unsplash

This vulnerability has emerged from the collective efforts of researchers across various universities, culminating in a detailed analysis dubbed ‘Go Fetch.’ At its core, the bug exploits a vulnerability within the CPU, allowing an unprivileged process to siphon off cryptographic keys from another process. This could potentially compromise sensitive information and undermine the security protocols reliant on these cryptographic keys.

The mechanism behind this vulnerability is a side-channel attack, particularly focusing on cache-based memory. Such attacks exploit the nuances of operational latency, such as the time taken by a process to execute, to infer otherwise inaccessible data. In the context of CPUs, the cache serves as an intermediary between the rapid processing unit and the slower RAM. This shared cache across processes becomes a fertile ground for side-channel attacks, revealing patterns of memory access that can be exploited to leak information.

The precedent for this type of vulnerability traces back to the notorious Spectre and Meltdown bugs of 2016, which similarly leveraged speculative execution and cache timing to access protected memory areas. The ‘Go Fetch’ vulnerability pushes this boundary further by targeting the data memory-dependent prefetchers (DMPs) in Apple’s silicon. DMPs are designed to anticipate future memory needs by prefetching data, a process that inadvertently opened a Pandora’s box in this scenario.

The flaw lies in the DMPs’ indiscriminate prefetching of data that resembles memory addresses, without validating their legitimacy. This oversight means arbitrary memory addresses can trigger prefetching, leading to cache timing discrepancies that reveal sensitive information. The genius of ‘Go Fetch’ lies in its ability to manipulate this prefetching behavior to leak cryptographic keys, showcasing a sophisticated understanding of CPU architecture and cache mechanics.

While the revelation of such a bug might seem alarming, it also highlights the continuous arms race in cybersecurity. As vulnerabilities are discovered and exploited, they pave the way for more robust security measures. The concept of constant-time programming, for instance, aims to standardize operational timing to mask such side-channel attacks. However, the trade-off between security and performance remains a delicate balance, one that CPU designers navigate with each innovation.

The discovery of the ‘Go Fetch’ bug is a testament to the ingenuity and perseverance of security researchers, underscoring the perpetual cat-and-mouse game between hackers and defenders. It serves as a reminder of the complexities inherent in modern computing architectures and the ongoing need for vigilance in the face of evolving cyber threats.

Photo by Jimmy Jin on Unsplash

As we move forward, the tech community is left to ponder the implications of such unpatchable vulnerabilities. The incident not only calls for immediate responses from affected users but also sparks a broader conversation on the future of secure computing. With each leap forward in technology, the quest for impenetrable security continues, challenging us to rethink our approaches and assumptions in safeguarding the digital world.

Sources & More Details:
https://gofetch.fail/files/gofetch.pdf
https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/

--

--

Shahab Hasan

A motivated and enthusiastic young individual with passion for advancing in the artificial intelligence industry. Studying Applied AI at Hong Kong University.