New hack breaks open Apple's USB-C security
A security researcher has worked out how to hack a proprietary USB-C controller used by Apple, an issue that could eventually lead to new iPhone jailbreaks and other security problems.
As one of the more privacy and security-focused companies, Apple has become a prized target for hackers to beat. In one instance, it seems the iPhone's USB-C controller has become a risk factor.
Revealed at the 38th Chaos Communication Congress in December, with information only being revealed to the public in January, researcher Thomas Roth presented a demonstration of attacking the ACE3 USB-C controller.
The ACE3 USB-C controller is a key element, as it is in charge of recharging the device and handling data transfers. It first appeared in the iPhone 15 generation, managing the included USB-C port.
SiliconAngle reports Roth managed to reverse-engineer the controller, exposing its firmware and communication protocols. From there, he could reprogram the controller to perform acts, such as injecting malicious code and bypassing important security checks.
A somewhat limited intrusion
While the hack sounds like a massive issue, it's not really a problem for the vast majority of users. To achieve it, Roth relied on custom USB-C cables and devices, and needed clear physical access to the device to pull it off.
Posted on: 1/14/2025 3:43:42 AM
|