apple patient
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Tests & Experience Reports
  • Generally
No Result
View All Result
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Tests & Experience Reports
  • Generally
No Result
View All Result
apple patient
No Result
View All Result

FileVault: New vulnerability discovered in Intel chips

by Milan
March 6, 2020
in News
Cybersecurity and computer security concept. Notebook and login screen and padlock symbolizing computer security.

Cybersecurity and computer security concept. Notebook and login screen and padlock symbolizing computer security.

Following the Meltdown and Spectre security vulnerabilities, a new hardware-based exploit has now been discovered in Intel chips. This is said to make Apple's FileVault technology vulnerable. 

Last year, the Meltdown and Spectre security vulnerabilities were discovered, which caused a lot of trouble. According to current reports, the security vulnerabilities at that time have since been fixed. But now there seems to be a new problem and it is said to be unpatchable. According to reports, the SSD encryption FileVault on Mac devices without T1 and T2 chips is at risk. 

The purpose of FileVault

FileVault technology is basically designed to encrypt the entire hard drive. The AES128-bit XTS standard encryption is used by default. However, the Disk Utility also offers the AES256-bit XTS version, which is military-grade encryption that makes the Mac 100 percent secure. According to a new report from The Register, however, this very "feature" is at risk. A brand new hardware-based vulnerability in Intel chips can make FileVault vulnerable, as the security hole is said to be unpatchable. According to initial findings, attackers could compromise the Mac's boot process to gain access to the codes responsible for encrypting the hard drive. The problem is described as follows: explained: 

The problem revolves around cryptographic keys that, if obtained, can be used to break the root of trust in a system. Buried deep inside modern Intel chipsets is what is known as the Management Engine, or nowadays the Converged Security and Manageability Engine (CSME).

Like a digital janitor, the CSME works behind the scenes, beneath the operating system, hypervisor, and firmware, performing many important low-level tasks such as booting up the computer, controlling power levels, starting the main processor chips, verifying and booting the motherboard's firmware, and providing cryptographic functions. The engine is the first thing that runs when a machine is turned on. One of the first things it does is set up memory protections on its own built-in RAM so that other hardware and software cannot interfere with it. However, these protections are disabled by default, so there is a tiny time gap between when a system is turned on and the CSME executing the code in its boot ROM that installs these protections, which come in the form of input-output memory management unit (IOMMU) data structures called page tables.

During this time gap, other hardware - physically connected or present on the motherboard - capable of firing a DMA transfer into the CSME's private RAM can overwrite variables and pointers and take over execution. At this point, the CSME can be seized for malicious purposes without the software running on top of it noticing. It's like a sniper shooting a sliver of a target while shooting past small cracks in a wall. The DMA write race can be attempted when the machine is powered on or awakens from sleep. If someone manages to extract this hardware key, they can unlock the chipset key and, with code execution within the CSME, undo Intel's root of trust in large product areas at once. When this happens, total chaos will reign. Hardware IDs will be spoofed, digital content will be extracted, and data from encrypted hard drives will be decrypted.

Therefore, the Mac should not be released

The exploit is not only hardware-based, it is also considered unpatchable. Anyone who passes their Mac on to third parties is making themselves vulnerable, as the security hole can only be exploited if attackers gain physical access to the device. Intel's advice is that the affected devices must remain in the "physical possession" of the owner. But not all Macs are affected. According to the report, Apple devices with the T1 and T2 security chips are not affected, as these are activated before the Intel chip when the Mac boots up, and the FileVault encryption codes are stored in the "Secure Enclave". Accordingly, only "older" devices are affected by the problem. (Photo by Jakub Jirsak / Bigstockphoto)

  • Kr00k: Security flaw discovered in Wi-Fi encryption
Add Apfelpatient to your Google News Feed. 
Was this article helpful?
YesNo
Via: The Register
Tags: Macsecurity gap
Previous Post

Backup: WhatsApp tests new security feature

Next Post

Apple recommends employees work from home

Next Post
CUPERTINO, CALIFORNIA, UNITED STATES - NOV 26th, 2018: People at the Apple Park Visitor Center in Silicon Valley explore the new Apple Offices using a scaled-down replica of the campus and a virtual reality program

Apple recommends employees work from home

Apple Notes App iOS 26

iOS 26: These new features await you in Apple Notes

June 13, 2025
iPadOS 26 iPad Fold

iPadOS 26 is ready for the upcoming 18.8-inch iPad Fold

June 13, 2025
Apple Music iOS 26

Apple Music gets a DJ feeling with AutoMix feature

June 13, 2025

About APFELPATIENT

Welcome to your ultimate source for everything Apple - from the latest hardware like iPhone, iPad, Apple Watch, Mac, AirTags, HomePods, AirPods to the groundbreaking Apple Vision Pro and high-quality accessories. Dive deep into the world of Apple software with the latest updates and features for iOS, iPadOS, tvOS, watchOS, macOS and visionOS. In addition to comprehensive tips and tricks, we offer you the hottest rumors, the latest news and much more to keep you up to date. Selected gaming topics also find their place with us, always with a focus on how they enrich the Apple experience. Your interest in Apple and related technology is served here with plenty of expert knowledge and passion.

Legal

  • Imprint – About APFEPATIENT
  • Cookie Settings
  • Privacy Policy
  • Terms of Use

service

  • Partner Program
  • Netiquette – About APPLEPATIENT

RSS Feed

Follow Apfelpatient:
Facebook Instagram YouTube threads
Apfelpatient Logo

© 2025 Apfelpatient. All rights reserved. | Sitemap

No Result
View All Result
  • Home
  • News
  • Rumors
  • Tips & Tricks
  • Tests & Experience Reports
  • Generally

© 2025 Apfelpatient. All rights reserved. | Page Directory