They discover how to hack the iPhone’s USB-C controller

The USB-C port on the iPhone 15 and iPhone 15 Pro, one of the most notable novelties of that generation, aroused both enthusiasm and doubts. Although its arrival was celebrated by most users, this change has also tested the security of the device, especially with regards to its internal architecture. And now this is proven, since Cybersecurity researchers have discovered a vulnerability in the iPhone USB-C controllerrevealing a possible Achilles heel in the design of these devices.

The ACE3 USB-C controller, developed by Apple, is not simply a component that manages power delivery and connectivity; This is a complete microcontroller that runs a USB stack and is connected to the iPhone’s internal buses. According to researcher Thomas Roth, known as “stacksmashing”, he managed to hack this chip using advanced techniques such as reverse engineering, side channel analysis and electromagnetic fault injection. These techniques allowed dump the controller ROM, analyze its functions and execute code on the device.

The attack, carried out in a controlled environment, has no immediate impact on user security, but raises important questions about the possible implications of this finding. By accessing the controller firmware, you open the door for other researchers (or cybercriminals) to identify software vulnerabilities that could be exploited in the future. Roth emphasizes that his work is investigative in nature, but warns that not all actors interested in this type of research share his intentions.

Affected devices specifically include iPhones with this USB-C controller. According to Roth himself, This vulnerability does not affect other platforms, such as Androidwhich reduces the potential scope of the problem. However, this finding reinforces the need to maintain constant vigilance over the most advanced devices, especially when they adopt technological solutions that have not been used before, even when these have already been established in the market for some time, as is the case.

Although this vulnerability has not been exploited maliciously, Users should follow normal security practices to minimize risks. These include keeping devices updated with the latest versions of iOS, using only certified cables and chargers, and avoiding connections to public or questionable USB ports. These recommendations not only protect against potential vulnerabilities, but also strengthen the overall security of your devices.

This discovery is a reminder that even the most anticipated advances, such as the adoption of USB-C, can pose unexpected challenges. Cybersecurity investigations like this are essential to identifying and resolving issues before they can be exploited, and underscore the importance of both manufacturers and users remaining vigilant in an ever-evolving technological environment.

More information

Source: www.muycomputer.com