Recent iPhone, Mac Models Susceptible to Side Channel Exploitation, Putting Sensitive Information at Risk: Report

Even Apple's latest devices such as the iPhone 16 models and M4 Macs are at risk of exploitation.

Advertisement
Written by Shaurya Tomer, Edited by Siddharth Suvarna | Updated: 29 January 2025 15:44 IST
Highlights
  • A and M-series chips are said to be susceptible to side-channel attacks
  • FLOP attack can steal data from Google Maps and iCloud Calendar
  • Attacks exploit speculative execution in Apple Silicon chipsets
Recent iPhone, Mac Models Susceptible to Side Channel Exploitation, Putting Sensitive Information at Risk: Report

iPhone 16 is one of the models affected, researchers say

Photo Credit: Apple

Security researchers have discovered new vulnerabilities in Apple's in-house Silicon chipsets which may leave it exposed to exploitation, according to a report. The Cupertino-based technology company's A and M-series chipsets, which power the iPhone/iPad and Mac, respectively, are said to be susceptible to side channel attacks which may allow threat actors to access the memory contents, including data from apps like Google Maps and iCloud Calendar, that may otherwise be off limits. The report reveals that even the latest iPhone 16 models and M4 Macs could fall prey to this exploitation.

Apple Devices are at Risk

In an Ars Technica report, security researchers highlighted that the following Apple devices are at risk of being prone to sensitive data theft:

  1. All Mac laptops from 2022–present
  2. All iMac models from 2023–present
  3. All iPad Pro, Air, and Mini models from September 2021–present
  4. All iPhone models from September 2021–present

What Causes the Vulnerability

Security researchers revealed that threat actors can exploit Apple's A and M-series chipsets by executing two types of side channel attacks. Rather than directly targeting algorithms or cryptographic defenses, these attacks involve exploitation of unintended system information, such as electromagnetic emissions, power consumption, timing, and even sound. The problem in Apple Silicon chips arises due to an optimisation technique used by the CPU called speculative execution. It predicts and executes instructions in advance, and even predicts the data flow to improve the processing speed.

The most dangerous of the two attacks is dubbed Floating-point Operations or FLOP, explain researchers. It exploits the speculative execution in the chips' load value predictor (LVP) — a component which predicts memory contents when they are not readily accessible. It induces forward values from malformed data to LVP to gain access to off-limit memory contents. With FLOP, threat actors can reportedly steal sensitive information like location history from Google Maps and events from the iCloud Calendar. This requires the victim to be logged in to Gmail or iCloud in one tab and the attacker site in another for an estimated five to 10-minute duration.

Advertisement

Highlighting the danger, researchers noted, “If the LVP guesses wrong, the CPU can perform arbitrary computations on incorrect data under speculative execution. This can cause critical checks in program logic for memory safety to be bypassed, opening attack surfaces for leaking secrets stored in memory.”

The second attack, called Speculative Load Address Prediction or SLAP, is reported to misuse load address predictor (LAP) on the Apple Silicon chips. It is a component which predicts the memory location from which the instruction set can be accessed. SLAP exploits this security feature by forcing it to load inaccurate memory addresses. This occurs when older load instruction values are forwarded to recently scheduled arbitrary instructions. Thus, when a user opens a Gmail tab on Safari and another one on an attacker website, the latter is capable of accessings JavaScript code's sensitive strings which may enable them to read the contents of the email.

Advertisement

FLOP is said to be more dangerous than SLAP as it can not only read memory addresses in the browser address bar, but also works against both Google Chrome and Safari.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. OTT Releases of the Week: Truth or Trouble, Motorheads, and More
  2. Samsung Galaxy A26 Review
  3. WhatsApp Rolls Out Voice Chat Feature With End-to-End Encryption
  4. Jony Ive and OpenAI Said to Launch AI Device With Cameras in 2027
  5. Xiaomi 15S Pro With With In-House XRING 01 SoC, 6,100mAh Battery Launched
  6. Honor 400 Series With 200-Megapixel Main Camera Debuts
  7. Xiaomi Civi 5 Pro With Snapdragon 8s Gen 4 SoC, 6,00mAh Battery Launched
  8. Realme GT 7T Roundup: All You Need to Know Ahead of Its Debut
  1. Xiaomi YU7 EV With 235 KMPH Claimed Top Speed and 835 KM CLTC Range Launched: All Details
  2. Xiaomi XRING O1 Die Shot Reveals Details of 10-Core CPU, 6-Core NPU and More
  3. Sony Said to Be Planning PlayStation Event for June, Could Be State of Play
  4. Xiaomi Civi 5 Pro With Snapdragon 8s Gen 4 SoC, 50-Megapixel Front Camera Launched
  5. Crypto DeFi Project Cetus Protocol Suffers Security Breach
  6. Anthropic Releases Claude 4 Series AI Models With Improved Coding Capability and Tool Use
  7. Apple Smart Glasses Said to Arrive By 2026-End With Built-In Siri Support
  8. Google Said to Face DOJ Antitrust Probe Over Character.AI Deal
  9. Honor 400, Honor 400 Pro With Snapdragon SoCs, 200-Megapixel Main Camera Launched: Price, Specifications
  10. FTC Drops Case Over Microsoft's $69 Billion Activision Blizzard Deal
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.