A group of Chinese hackers Pangu discovered in devices from Apple “Unrecoverable” vulnerability. It connects to the Secure Enclave chip, a coprocessor that stores encryption keys, passwords, Apple Pay cards, and biometrics for Touch ID and Face ID.
Since the vulnerability is hardware, not software, Apple will not be able to fix it with any patches. To resolve the issue, it will be necessary to make adjustments to the architecture of the chip itself. As the hackers point out, the problem affects all devices running on Apple processors, from the A7 to the A11 Bionic. These include:
- iPhone 5s – iPhone X;
- iPad 5-7 generation;
- iPad Air 1st to 2nd generation;
- iPad mini 2-4 generation;
- iPad Pro.
In addition, all models of Apple Watch smartwatches, the HomePod smart speaker, as well as many Apple TV set-top boxes and some Mac models using chips are at risk. T1 or T2… Thanks to the vulnerability, hackers have already managed to hack the mobile operating system iOS 14.
Apple uses the Secure Enclave chip to store sensitive information such as Face ID patterns that don’t sync with iCloud. At the same time, the hacker group reports that an important feature of the exploit is the fact that physical access to the device is required to use it. Remotely exploiting the vulnerability will not work.
If you notice an error, select it with the mouse and press CTRL + ENTER.