With the aim of improving security in computers, Apple introduced the new T2 chip in Macs in 2018. It promised to provide devices with numerous functions that improve the user experience and above all, emphasis was placed on security toasted. But now it has been discovered that it is not as secure as might be believed since a new exploit has been discovered that may violate the security of the T2 chip. In this article we tell you all the details that are known about it.
What is this new security flaw?
Among the functions of this T2 chip, the encrypted storage stands out, as well as the ways to start the operating system in safe mode. Obviously they are quite critical points in any device and they have to be fully shielded. Now it has been learned through Niels Hofmans security research that this chip is based on the A10 processor and is vulnerable to the chckm8 exploit. Lovers of jailbreaking iPhone can surely recognize this vulnerability, since it is the same vulnerability that applies to jailbreak iOS devices.

According to the blog post, this researcher claims that the exploit may end up hijacking the T2 chip’s operating system startup by accessing its hardware. By itself this exploit cannot do much, since it is necessary to use the vulnerability developed by Pangu in order to bypass the verification that is performed when the device is starting. Once it has been evaded, any hacker can access the operating system entries, specifically the root and user privileges. It is true that this is not necessary to access the stored passwords to the data, but you can always inject a program to be able to monitor the user’s keyboard. In this way, when the data is decrypted by the users, the hacker will know the password. This is why a firmware password or the activation lock provided by ‘Search’ will solve nothing.
Apple is not responding about this exploit
This security researcher has informed Apple of this exploit but the company has not yet given any kind of response. Although we always say that Apple can release a software update to apply a solution, in this case that cannot be said. It should be remembered that the SepOS operating system is in the memory of the T2 chip. This fact makes the component much more secure but also makes it impossible for Apple to correct it through an update.
The good news is that for this vulnerability to take effect, it is necessary to connect infected hardware to the computer, such as a charging cable. That is why, as a preventive measure, you should always use untrusted cables, including any type of adapter with a USB-C input, to avoid this vulnerability.