in

Apple’s T2 Chip Has An Unrecoverable Vulnerability

Apple’s T2 Chip Has An Unrecoverable Vulnerability



According to an independent security researcher, there is a serious vulnerability in Mac devices with Intel processors and T2 chips. According to the researcher, this vulnerability cannot be repaired with any patch either.

According to the claims of a cyber security researcher, Intel processor and With T2 chip Apple macOS devices will allow attackers to gain administrative access irreparable has a security vulnerability.

This T2 chip is used in many modern macOS devices. Apple Silicon coprocessor. This chip handles features such as audio processing, as well as preloading and security operations. According to Niels H., an independent security researcher, the T2 chip is can’t be patched has a serious security flaw.

Vulnerability in T2 chip that allowed administrator access

According to Niels H. Apple A10 processor based T2 chip, which also affects iOS-based devices ‘chekcm8’ vulnerable to vulnerability. This allows attackers to block the activation lock and perform other malicious attacks.

Under normal circumstances, the T2 chip will exit with an error if it detects a decoding state while in DFU mode. However, this vulnerability was developed by Pangu and DFU’s blocking exit safety mechanism can be matched with the other deficit.

You May Also Like:  Razer Introduces Iskur, Its First Gaming Chair

security bug

After gaining access to the T2 chip, the attacker gains full administrative access and core administrative privileges. Although files protected with FileVault encryption cannot be decrypted ‘keyloggerPasswords can be stolen using ‘. The vulnerability also allows security locks to be bypassed manually.

RELATED NEWS

How Easily A Critical Vulnerability in Instagram Can Be Exploited

Niels H. stated that he reached Apple to close this gap, but did not receive a return. In order to attract attention, he published an article on the blog page about the vulnerability. Also, according to Niels H. Affects all Mac devices with Intel processors and T2 chips. However, an attacker needs physical access to the device to exploit this vulnerability. If you have a Mac device with Intel processor and T2 chip, you can be careful not to connect USB devices with unknown source to your device.

Source :
https://appleinsider.com/articles/20/10/05/apples-mac-t2-chip-has-an-unfixable-vulnerability-that-could-allow-root-access

// share click $('body').on({ click: function (){ var $this = $(this), dataShareType = $this.attr('data-share-type'), dataType = $this.attr('data-type'), dataId = $this.attr('data-id'), dataPostUrl = $this.attr('data-post-url'), dataTitle = $this.attr('data-title'), dataSef = $this.attr('data-sef');

switch(dataShareType) { case 'facebook': FB.ui({ method: 'share', href: dataSef, }, function(response){ if (response && !response.error_message) { updateHit(); } });

break;

case 'twitter': shareWindow('https://twitter.com/intent/tweet?via=webtekno&text="+encodeURIComponent(dataTitle) + " %E2%96%B6 ' + encodeURIComponent(dataSef)); updateHit(); break;

case 'gplus': shareWindow('https://plus.google.com/share?url=" + encodeURIComponent(dataSef)); updateHit(); break;

case "mail': window.location.href="https://www.webtekno.com/mailto:?subject=" + encodeURIComponent(dataTitle) +'&body='+ encodeURIComponent(dataSef); //updateHit(); break;

case 'whatsapp': window.location.href="whatsapp://send?text=" + encodeURIComponent(dataTitle) +' %E2%96%B6 '+ encodeURIComponent(dataSef); updateHit(); break; }

function shareWindow (url) { window.open(url, "_blank", "toolbar=yes, scrollbars=yes, resizable=yes, top=500, left=500, width=400, height=400"); }

function updateHit () { $.ajax({ type: "POST", url: dataPostUrl, data: {contentId: dataId, contentType: dataType, shareType: dataShareType}, success: function(data) {

if ($('.video-showcase').length > 0) { var $container = $('.video-showcase'); } else if ($('article[data-id="' + dataId + '"]').length > 0) { var $container = $('article[data-id="' + dataId + '"]'); } else if ($('.wt-share-item[data-id="' + dataId + '"]').length > 0) { var $container = $('.wt-share-item[data-id="' + dataId + '"]'); } else { $container = null; }

//var $container = dataType == 'video' ? $('.video-showcase') : $('article[data-id="' + dataId + '"]');

if ( $container != null && $container.length > 0 ) { var $badged = $container.find('.wt-share-badge-' + dataShareType);

var $headerCount = $('.content-header').find('.wt-share-count'), $containerCount = $container.find('.wt-share-count'), value = parseInt($containerCount.html()) + 1;

$container.data('share', value); //$containerCount.html(value);

if ($headerCount.length > 0) { //$headerCount.html(value); }

if ( $badged.length > 0 && (dataShareType == 'facebook' || dataShareType == 'twitter')) { if ($badged.hasClass('is-visible')) { //$badged.html(data); } else { //$badged.addClass('is-visible').html(data); } } }

} }); } } }, '.wt-share-button') }); }



Dikkat: Sitemiz herkese açık bir platform olduğundan, çox fazla kişi paylaşım yapmaktadır. Sitenizden izinsiz paylaşım yapılması durumunda iletişim bölümünden bildirmeniz yeterlidir.