Apple’s T2 chip has an unfixable vulnerability that could allow root access

A cybersecurity researcher claims that Apple macOS devices with Intel processors and a T2 chip are vulnerable to an unfixable exploit that could give attackers root access.

Mac mini now features the Apple T2 Security Chip
Mac mini now features the Apple T2 Security Chip, enabling on-the-fly data encryption, secure boot and up to 30 times faster HEVC video transcoding.
Mike Peterson for AppleInsider:

The T2 chip, present in most modern macOS devices, is an Apple silicon co-processor that handles boot and security operations, along with disparate features such as audio processing. Niels H., an independent security consultant, indicates that the T2 chip has a serious flaw that can’t be patched.

According to Niels H., since the T2 chip is based on an Apple A10 processor, it’s vulnerable to the same checkm8 exploit that affects iOS-based devices. That could allow attackers to circumvent activation lock and carry out other malicious attacks.

According to Niels H., the vulnerability affects all Mac products with a T2 chip and an Intel processor. Since Apple silicon-based devices use a different boot system, it isn’t clear whether they are also impacted.

Because of the nature of the vulnerability and related exploits, physical access is required for attacks to be carried out.

MacDailyNews Take: Another reason to upgrade to Apple silicon-based Macs when they begin arriving soon.

9 Comments

  1. Keep in mind that anytime someone has physical access to a system, they can break in. This is only a problem for an individual if they have their computer somewhere where they aren’t present, and a person can use that USB cable to plug a device in with malicious software on it.

    Otherwise, there’s no problem at all. You can’t be infected with this over the internet, which is where pretty much all problems come from.

    1. For regular users, yes… However, an unsuspecting executive who isn’t briefed on the potential risks could also, say, be at a meeting where he is given a USB key with “those 3D architectural mockups” from a bad player.

      The question is… can this exploit be taken advantage of by just plugging in a USB key? For newer macs, which combine the “power” port with the “data” port (USB-C) could a nefarious player sell a loung a “convenient” laptop charging port for busy execs in the airport lounges? No need to bring out your power cable, here’s a cable for you built into the table.

      How about a “FREE” usb key given out at a conference with the slide deck and other documents. I know these may seem somewhat far fetched as many things are online these days rather than physically distributed, but knowing that there is a threat out there helps people to practice “Safe computing”. It’s similar to STDs, really. People get them more often if they’re ignorant that the risks exist. Sure, you can’t catch them in the air as our body’s antivirus system has extremely intelligent “machine learning” built-in (and the viral infection isn’t airborne) but that doesn’t mean that the threat doesn’t exist for those that aren’t careful.

  2. I heard this story a few months ago, and it seems to not have any new input or developments. “Unfixable” is as big a red flag as “Unhackable”, and it remains to be seen if this exploit is something that can actually happen in real life.

    My understanding is that the T2 chip actually protects the internal drive, rather then the system. You can bypass it entirely by booting from an external drive. (But then no data from the internal drive will be readable.) So really whatever is going on with the T2 can’t be worse than the status quo for everyone else’s built in drives.

    But most importantly MDN, has there been any independent verification of this? Or is it just one guy saying it?

  3. MDN take is wrong. The T2 chip is still a disaster. So if you encrypt your drive with a password, someone has to put a gun to your head to force you to give it up on a non-T2 drive. If you use the T2, they can just hack the T2 chip and get it.

    The T2 chip has been a ****show and caused more problems than provide solutions. They should limit the T2 chip to just the Secure Enclave for touch/faceID. Stop mucking up the system with this lame copy protection scheme to lock users in to horrible storage solutions that are soldered in, locked to that dingus chip, and cause users huge data losses.

    It’s bigger disaster than the butterfly keyboard. Kill the T2 chip. Die die die!

    Thank goodness you can avoid using it on the new Mac Pro.

    1. “ The T2 chip has been a ****show and caused more problems than provide solutions. They should limit the T2 chip to just the Secure Enclave for touch/faceID. Stop mucking up the system with this lame copy protection scheme to lock users in to horrible storage solutions that are soldered in, locked to that dingus chip, and cause users huge data losses.”

      Evidence?

  4. “According to Niels H., the vulnerability affects all Mac products with a T2 chip and an Intel processor. Since Apple silicon-based devices use a different boot system, it isn’t clear whether they are also impacted.”

    So if I understand this correctly, it is clear that all Mac products using an Intel Processor with the T2 is affected. But there is also reason to believe that any other Apple device that uses the T2 chip may still be affected. MDN must be fairly certain future Apple devices including the Mac will not use the T2 based on their suggestion.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.