Major Security Flaw in Apple's USB-C Controller Exposes Devices to Hack Attacks
January 13, 2025Roth's research involved reverse-engineering the ACE3 controller's firmware and communication protocols, enabling him to reprogram it for unauthorized actions, including bypassing security checks.
Although the technical details of the hack are complex and have only recently come to light, there is growing concern that malicious hackers may soon attempt to exploit these vulnerabilities.
Apple Inc. users are facing significant security risks due to a newly disclosed hack of the ACE3 USB-C controller, which is crucial for managing charging and data transfer in the latest Apple devices.
The hack exploits insufficient safeguards in the ACE3 controller, allowing attackers to gain low-level access through specially crafted USB-C cables or devices.
The hack was revealed by security researcher Thomas Roth at the 38th Chaos Communication Congress in December 2024, highlighting serious vulnerabilities in Apple's USB-C implementation.
In light of these developments, users are advised to remain cautious, especially since Apple has not yet commented on the issue or provided a timeline for addressing the ACE3 controller flaw.
Compromised ACE3 controllers can emulate trusted accessories or perform unauthorized actions without user consent, which poses significant risks to sensitive user data and overall device integrity.
Experts warn that this hack could facilitate untethered jailbreaks or persistent firmware implants, potentially compromising the main operating system of affected devices.
Summary based on 1 source
Get a daily email with more Tech stories
Source
SiliconANGLE • Jan 13, 2025
Apple devices at risk after security researcher hacks ACE3 USB-C controller - SiliconANGLE