Skip to content
Home » Apple MIT found vulnerabilities in Apple’s M1 chips

Apple MIT found vulnerabilities in Apple’s M1 chips

    Apple M1 processor can be found in all Cupertino products. This chipset has revolutionized North American companies, from Apple’s MacBooks to their MacBooks to the iPad Pro tablets in the top configuration.

    The industry was almost blind to 2020’s announcement due to its dedication to processing power and resource optimization. The M1-Silicate has its flaws as well as security holes.

    APPLE’S M1 TECHNOLOGY IS TARGETED BY PACMAN.

     

    The American Institute of Technology has reported a security flaw in Apple M1 chipsets. This was based on an earlier investigation. Malicious attacks could be carried out on products by PACMAN, the threat PACMAN.

    This was reported by MacWorld and 9to5Mac, which both cite MIT researchers. This alarming news comes just days after Apple introduced its second generation processors, the M2. He did it at the WWDC 2022 annual conference, where we learn about new products.

    Face to face with this security flaw: a PACMAN. He was given this name in consideration of the Apple MM1 Authentication Code. (PAC).

    SECURITY FLAWS CANNOT BE FIXED WITH SOFTWARE PAT.

     

    The MSI explains that there is a security feature to protect CPUs from an attacker who has memory access.

    Pointers, or pointers, store the memory address and then detect or compare any abnormal behavior or changes in pointers that are caused by unauthorised access or attack. The perpetrator can also turn the pointer off and he is hardly controlled by the computer.

    MacWorld specifically reports the testimony of Joseph Ravichandran (MIT researcher), which is one of the references to this threat. If it is against those who were aware of its consequences, PACMAN has the potential to be very destructive.

    To support his thesis, MIT was able to stop attacks on Apple M1 computers using the PACMAN method. Worst of all, It is not possible to fix the flaw with a simple software patch.

    This threat should not be a problem for average consumers. MIT’s conclusion that this issue is not a threat to users means that it’s unlikely anyone will be able to replicate their steps to gain full access with the Apple M1 chip.