Security Vulnerabilities Discovered in Apple Processors
en-GBde-DEes-ESfr-FR

Security Vulnerabilities Discovered in Apple Processors


The US tech giant Apple has always advertised security assurances alongside ever faster processor performance for its products. Now an international team of cybersecurity researchers, including Yuval Yarom, principle investigator at the cluster of excellence CASA and Professor of Computer Security at the Faculty of Computer Science and the Horst Görtz Institute for IT Security at Ruhr University Bochum, Germany, has discovered at least two security vulnerabilities. The research results will be presented at the renowned IEEE SP 2025 and USENIX Security 2025 conferences. Further information can be found on their website.

To identify vulnerabilities in existing systems, cybersecurity experts must examine real-world attack scenarios. In their paper "FLOP: Breaking the Apple M3 CPU via False Load Output Predictions," researchers Jason Kim, Jalen Chuang, and Daniel Genkin (all from Georgia Institute of Technology) along with Yuval Yarom (Ruhr University Bochum) analyzed Apple's M- and A-series processors in detail.

Manufacturers continually develop optimization techniques to enhance processor speed and performance. “Unfortunately, we keep realizing that security often gets the short end of the stick,” explains Yuval Yarom. The team examined Apple's Load Value Predictor (LVP), designed to accelerate computing by predicting computational steps and anticipating data retrieval from memory. The processor performs calculations based on these predictions and compares the results when the actual data arrives. If the prediction is incorrect, the processor discards the results and recomputes using the correct data.

Sensitive data can be spied out

The researchers demonstrated that Apple's LVP is prone to errors. “If the LVP guesses incorrectly, the CPU can perform arbitrary calculations with incorrect data under speculative execution. This can lead to critical checks in the program logic for memory security being bypassed, creating attack surfaces for spying on secrets stored in memory,” the scientists warn. Their findings show that attacks on web browsers such as Safari and Chrome are possible, potentially exposing sensitive information like credit card details, search histories, and calendar events.

A second paper by the same research team titled "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon" reveals another security vulnerability in Apple processors. Similar to "FLOP," the researchers examined a specific unit in the processor: the central processing unit (CPU) — the "brain" of a computer responsible for most calculations and tasks. Starting with the M2/A15 series, all Apple processors are equipped with a Load Address Predictor (LAP), which predicts the next memory address from which the CPU will retrieve data. The research shows that when the LAP makes incorrect predictions, arbitrary calculations can be initiated, creating a significant security risk. "This enables an end-to-end attack on the Safari browser, allowing attackers to spy on email content or browser activity," the team explains.

The researchers reported these vulnerabilities to the Apple Product Security Team in May and September last year as part of Responsible Disclosure, providing ample time for countermeasures. The findings were permitted to be published on January 28, 2025.

Regions: Europe, Germany, Georgia, North America, United States
Keywords: Applied science, Computing

Disclaimer: AlphaGalileo is not responsible for the accuracy of news releases posted to AlphaGalileo by contributing institutions or for the use of any information through the AlphaGalileo system.

Referenzen

We have used AlphaGalileo since its foundation but frankly we need it more than ever now to ensure our research news is heard across Europe, Asia and North America. As one of the UK’s leading research universities we want to continue to work with other outstanding researchers in Europe. AlphaGalileo helps us to continue to bring our research story to them and the rest of the world.
Peter Dunn, Director of Press and Media Relations at the University of Warwick
AlphaGalileo has helped us more than double our reach at SciDev.Net. The service has enabled our journalists around the world to reach the mainstream media with articles about the impact of science on people in low- and middle-income countries, leading to big increases in the number of SciDev.Net articles that have been republished.
Ben Deighton, SciDevNet
AlphaGalileo is a great source of global research news. I use it regularly.
Robert Lee Hotz, LA Times

Wir arbeiten eng zusammen mit...


  • BBC
  • The Times
  • National Geographic
  • The University of Edinburgh
  • University of Cambridge
  • iesResearch
Copyright 2025 by DNN Corp Terms Of Use Privacy Statement