Developer Hector Martin found a vulnerability in the Apple M1 processor that allows two applications, running under one operating system, to covertly exchange data with each other without using memory, files or any other normal operating system feature.
The specialist has named this vulnerability M1RACLES and, according to him, Apple intentionally violated the ARM specifications by removing one of the functions. The company probably believed that users of Apple’s proprietary operating system, computers, and laptops would not need this option.
- Scientists in Fear of This New Predator From Red Sea Eating Native Species in Mediterranean
- Does This Mean We Stopped Being Animal and Started Being Human Due to ‘Copy Paste’ Errors?
- The One Lifestyle Choice That Could Reduce Your Heart Disease Risk By More Than 22%
- Aging: This Is What Happens Inside Your Body Right After Exercise
- Immune-Boosting Drink that Mimics Fasting to Reduce Fat – Scientists ‘Were Surprised’ By New Findings
Hector Martin has alerted Apple users through his website, where he explains that this vulnerability allows two applications to exchange data with each other and that this process takes place at different users with different privileges.
During the data exchange, the programs create a secret channel.
According to the specialist, this vulnerability cannot be fixed through an update, since it is caused by the hardware. However, he noted that this vulnerability is unlikely to be used for a large-scale attack.
Apple’s first devices with the M1 processor, which replaced Intel processors, were introduced in November when the company introduced the Mac mini computer and the MacBook Pro and MacBook Air notebooks.
Image Credit: iStock