Hardware, Vulnerability Management

Security risks exposed following hack of Apple’s USB-C controller

Apple iPhone 15s are displayed for sale

Apple's proprietary ACE3 USB-C controller has been successfully breached by security researcher Thomas Roth, posing new security concerns for the tech giant, SiliconAngle reports.

The ACE3 controller, which is an integral component to the management of charging and data transfer tasks in Apple devices, was compromised using reverse-engineering techniques to exploit weaknesses in its firmware and communication protocols. Roth demonstrated how these vulnerabilities allow unauthorized actions such as bypassing security checks and injecting malicious commands.

The vulnerability was attributed to insufficient protections in the firmware, enabling attackers with specialized USB-C cables or devices to achieve low-level access to the controller and from there be able to manipulate compromised devices including emulating trusted accessories, intercepting sensitive data during transfers, or executing malicious commands. Experts said the integration of the ACE3 controller with internal systems raises significant risks, including the possibility of untethered jailbreaks and persistent firmware implants that can compromise the operating system. Although the hacking method is complex and details were disclosed only recently, the potential for malicious exploitation exists. Apple has not yet commented or released updates to address this vulnerability.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds