According to an independent security researcher, there is a serious vulnerability in Mac devices with Intel processors and T2 chips. According to the researcher, this vulnerability cannot be repaired with any patch either.
According to the claims of a cyber security researcher, Intel processor and With T2 chip Apple macOS devices will allow attackers to gain administrative access irreparable has a security vulnerability.
This T2 chip is used in many modern macOS devices. Apple Silicon coprocessor. This chip handles features such as audio processing, as well as preloading and security operations. According to Niels H., an independent security researcher, the T2 chip is can’t be patched has a serious security flaw.
Vulnerability in T2 chip that allowed administrator access
According to Niels H. Apple A10 processor based T2 chip, which also affects iOS-based devices ‘chekcm8’ vulnerable to vulnerability. This allows attackers to block the activation lock and perform other malicious attacks.
Under normal circumstances, the T2 chip will exit with an error if it detects a decoding state while in DFU mode. However, this vulnerability was developed by Pangu and DFU’s blocking exit safety mechanism can be matched with the other deficit.
After gaining access to the T2 chip, the attacker gains full administrative access and core administrative privileges. Although files protected with FileVault encryption cannot be decrypted ‘keyloggerPasswords can be stolen using ‘. The vulnerability also allows security locks to be bypassed manually.
How Easily A Critical Vulnerability in Instagram Can Be Exploited
Niels H. stated that he reached Apple to close this gap, but did not receive a return. In order to attract attention, he published an article on the blog page about the vulnerability. Also, according to Niels H. Affects all Mac devices with Intel processors and T2 chips. However, an attacker needs physical access to the device to exploit this vulnerability. If you have a Mac device with Intel processor and T2 chip, you can be careful not to connect USB devices with unknown source to your device.
Source :
https://appleinsider.com/articles/20/10/05/apples-mac-t2-chip-has-an-unfixable-vulnerability-that-could-allow-root-access
if(!isMobile) { $(function(){
//facebook window.fbAsyncInit = function() { FB.init({ appId : '1037724072951294', xfbml : true, version : 'v2.5' }); };
(function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "https://connect.facebook.net/tr_TR/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));
$('body').on({ click: function() { // facebook save button ajax FB.XFBML.parse(); } }, '.facebook-save');
// share scroll if ($('.content-sticky').length > 0) { if ($(window).width() >= 768) { $(window).on('scroll', function () { var scrollTop = $(this).scrollTop(); $('article').each(function () { if (scrollTop >= ($(this).find('.content-body').offset().top - 76)) { $(this).find('.content-sticky').addClass('sticky'); if (scrollTop >= ($(this).find('.content-body').offset().top + $(this).find('.content-body').height() - ($(this).find('.content-sticky').height() + 92))) { $(this).find('.content-sticky').removeClass('sticky'); $(this).find('.content-sticky').css({'bottom': '0px', 'top': 'auto'}); } else { $(this).find('.content-sticky').addClass('sticky').css({ 'bottom': 'initial', 'top': '76px' }); } } else { $(this).find('.content-sticky').removeClass('sticky').css({'bottom': 'auto', 'top': '0'}); } }); }); } }
// share click $('body').on({ click: function (){ var $this = $(this), dataShareType = $this.attr('data-share-type'), dataType = $this.attr('data-type'), dataId = $this.attr('data-id'), dataPostUrl = $this.attr('data-post-url'), dataTitle = $this.attr('data-title'), dataSef = $this.attr('data-sef');
switch(dataShareType) { case 'facebook': FB.ui({ method: 'share', href: dataSef, }, function(response){ if (response && !response.error_message) { updateHit(); } });
break;
case 'twitter': shareWindow('https://twitter.com/intent/tweet?via=webtekno&text="+encodeURIComponent(dataTitle) + " %E2%96%B6 ' + encodeURIComponent(dataSef)); updateHit(); break;
case 'gplus': shareWindow('https://plus.google.com/share?url=" + encodeURIComponent(dataSef)); updateHit(); break;
case "mail': window.location.href="https://www.webtekno.com/mailto:?subject=" + encodeURIComponent(dataTitle) +'&body='+ encodeURIComponent(dataSef); //updateHit(); break;
case 'whatsapp': window.location.href="whatsapp://send?text=" + encodeURIComponent(dataTitle) +' %E2%96%B6 '+ encodeURIComponent(dataSef); updateHit(); break; }
function shareWindow (url) { window.open(url, "_blank", "toolbar=yes, scrollbars=yes, resizable=yes, top=500, left=500, width=400, height=400"); }
function updateHit () { $.ajax({ type: "POST", url: dataPostUrl, data: {contentId: dataId, contentType: dataType, shareType: dataShareType}, success: function(data) {
if ($('.video-showcase').length > 0) { var $container = $('.video-showcase'); } else if ($('article[data-id="' + dataId + '"]').length > 0) { var $container = $('article[data-id="' + dataId + '"]'); } else if ($('.wt-share-item[data-id="' + dataId + '"]').length > 0) { var $container = $('.wt-share-item[data-id="' + dataId + '"]'); } else { $container = null; }
//var $container = dataType == 'video' ? $('.video-showcase') : $('article[data-id="' + dataId + '"]');
if ( $container != null && $container.length > 0 ) { var $badged = $container.find('.wt-share-badge-' + dataShareType);
var $headerCount = $('.content-header').find('.wt-share-count'), $containerCount = $container.find('.wt-share-count'), value = parseInt($containerCount.html()) + 1;
$container.data('share', value); //$containerCount.html(value);
if ($headerCount.length > 0) { //$headerCount.html(value); }
if ( $badged.length > 0 && (dataShareType == 'facebook' || dataShareType == 'twitter')) { if ($badged.hasClass('is-visible')) { //$badged.html(data); } else { //$badged.addClass('is-visible').html(data); } } }
} }); } } }, '.wt-share-button') }); }