Apple's T2 Security Chip Vulnerable to Attack Via USB-C

After it was reported last week that Apple's T2 Security Chip could be vulnerable to jailbreaking, the team behind the exploit have released an extensive report and demonstration.

t2checkm8 1

Apple's custom-silicon T2 co-processor is present in newer Macs and handles encrypted storage and secure boot capabilities, as well as several other controller features. It appears that since the chip is based on an Apple A10 processor, it is vulnerable to the same "checkm8" exploit that has been used to jailbreak iOS devices.

The vulnerability allows for the hijacking of the T2's boot process to gain access to the hardware. Normally the T2 chip exits with a fatal error if it is in Device Firmware Update (DFU) mode and it detects a decryption call, but by using another vulnerability developed by team Pangu, it is possible for a hacker to circumvent this check and gain access to the T2 chip.

Once access is gained, the hacker has full root access and kernel execution privileges, although they cannot directly decrypt files stored using FileVault 2 encryption. However, because the T2 chip manages keyboard access, the hacker could inject a keylogger and steal the password used for decryption. It can also bypass the remote Activation Lock used by services such as MDM and Find My. A firmware password does not prevent this since it too requires keyboard access, which requires the T2 chip to run first.

The exploit can be achieved without user interaction and simply requires a modified USB-C cable to be inserted. By creating a specialized device "about the size of a power charger," an attacker can place a T2 chip into DFU mode, run the "checkra1n" exploit, upload a key logger, and capture all keys. macOS can be left unaltered by the jailbreak, but all keys can still be logged on Mac laptops. This is because MacBook keyboards are directly connected to the T2 and passed through to macOS.

A practical demonstration shows checkra1n being run over USB-C from a host device. The targeted Mac simply displays a black screen while the connected computer confirms that the exploit was successful.

These cables function by allowing access to special debug pins within a USB-C port for the CPU and other chips that are usually only used by Apple.

Apple has not fixed the security flaw and it appears to be unpatchable. For security purposes, the T2's SepOS custom operating system is stored directly in the chip's SEPROM, but this also prevents the exploit from being patched by Apple via a software update.

In the meantime, users can protect themselves from the exploit by keeping their Macs physically secure and avoiding the insertion of untrusted USB-C cables and devices.

Top Rated Comments

ElRojito Avatar
11 months ago

So much for a chip that's supposed to be all about security.
We all know the first priority was thwarting third party repair attempts. Working at the Genius Bar, the T2 chip was the biggest pain in my ass.
Score: 35 Votes (Like | Disagree)
otternonsense Avatar
11 months ago
So much for a chip that's supposed to be all about security.
Score: 27 Votes (Like | Disagree)
ruka.snow Avatar
11 months ago

And what are we gonna do until then? If this is an unfixable, unpatchable possible exploit, isn't it grounds for a mass product recall?
How do you pull mass product recall out of an exploit that needs direct access to the hardware? There will always be exploits in hardware and software. Next up you'll be calling for a class action nonsense.
Score: 13 Votes (Like | Disagree)
djcerla Avatar
11 months ago
There’s no such thing as a “secure” chip.

With enough time and effort, everything is hackable.
Score: 10 Votes (Like | Disagree)
Elijen Avatar
11 months ago

There’s no such thing as a “secure” chip.

With enough time and effort, everything is hackable.
In cryptography secure system does not mean unhackable. It means the time needed to hack it is reasonably high (e.g. millions of years).
Score: 9 Votes (Like | Disagree)
otternonsense Avatar
11 months ago

Apple Silicon Macs will not need T2 (or T3) chips because it will be presumably built in to the apple chips.
And what are we gonna do until then? If this is an unfixable, unpatchable possible exploit, isn't it grounds for a mass product recall?
Score: 8 Votes (Like | Disagree)

Top Stories

anker feb 2 deals

Exclusive Deals: Save on Anker's Best Wall Chargers, USB-C Cables, and Solar Powered Portable Chargers

Tuesday February 2, 2021 9:10 am PST by
We've teamed up with Anker again this month, with a new collection of discount codes marking down USB-C wall chargers, surge protectors, portable chargers, USB-C hubs, and a wireless charger. All discount codes in this sale will expire on Sunday, February 7. Note: MacRumors is an affiliate partner with Amazon. When you click a link and make a purchase, we may receive a small payment, which...
t2checkm8 1

Apple's T2 Chip Has Unpatchable Security Flaw, Claims Researcher [Updated]

Tuesday October 6, 2020 2:46 am PDT by
Intel Macs that use Apple's T2 Security Chip are vulnerable to an exploit that could allow a hacker to circumvent disk encryption, firmware passwords and the whole T2 security verification chain, according to team of software jailbreakers. Apple's custom-silicon T2 co-processor is present in newer Macs and handles encrypted storage and secure boot capabilities, as well as several other...
m2 feature purple

Apple Preparing Faster M2 Chip for Next-Gen MacBook Pro

Tuesday June 1, 2021 3:04 am PDT by
Apple is readying its more powerful, next-generation "M2" chip for redesigned MacBook Pro models, according to recent reports. According to Nikkei Asia, Apple's next-generation custom silicon chip for the Mac, tentatively dubbed the "M2" chip, entered production in April. The processors take at least three months to produce and could begin shipping to Apple as early as July, in time for...
m1x feature dark blue

Shaky Rumor Claims Redesigned MacBook Pros Will Feature 'M1X' Chip and Remove the Front Logo

Friday May 21, 2021 7:27 am PDT by
A questionable report is today claiming that Apple's next-generation MacBook Pro models will feature an "M1X" chip and remove the "MacBook Pro" logo from below the display. The report from 9to5Mac says that "a source with a decent track record," iOS developer Dylandkt made the claims. According to Dylandkt, "Apple's planned name for the MacBook Pro chips" is the "M1X."The M1X is an extension ...
caldigit thunderbolt 4

CalDigit and OWC Unveil Thunderbolt 4 and USB 4 Cables

Thursday February 18, 2021 8:35 am PST by
Popular Mac accessory makers CalDigit and OWC have today announced new all-in-one Thunderbolt 4 and USB 4 cables, promising maximum data and power transfer over a single cable, as well as full compatibility with older USB devices. Thunderbolt 4 and USB 4 is the latest connectivity specification present in the newest Macs and high-end external hardware, offering performance up to 40Gb/s,...
satechi 9 in 1 hub

Satechi Launches New 9-in-1 On-the-Go Multiport USB-C Adapter

Thursday March 4, 2021 8:00 am PST by
Satechi, known for its lineup of accessories designed for Apple's Macs, today announced the launch of the USB-C On-the-Go Multiport Adapter that's compatible with the Mac lineup and the iPad Air and iPad Pro. With the USB-C On-the-Go Multiport Adapter, Satechi aimed to fit in as many ports as possible into a package that's still portable. It includes a built-in USB-C PD charging port that...
tsmc semiconductor chip inspection 678x452

Construction of Apple Supplier Plant in Arizona 'Well Under Way,' Will Manufacture Chips by 2024

Wednesday June 2, 2021 4:15 am PDT by
Apple chip supplier TSMC is moving ahead with plans for a manufacturing plant in Phoenix, Arizona, according to Bloomberg. In November of 2020, Phoenix city officials approved financial incentives and government support for the new plant. The city agreed to provide $200 million in support to build infrastructure including roads and sewers, according to a notice from the city's council....
iOS 14

Apple Stops Signing iOS 14.4.1 After Releasing iOS 14.4.2 With Fix for Actively Exploited Security Vulnerability

Friday April 2, 2021 12:40 pm PDT by
Following the release of iOS 14.4.2 on March 26, Apple has stopped signing iOS 14.4.1, the previously available version of iOS 14. With iOS 14.4.1 no longer being signed, it is not possible to downgrade to iOS 14.4.1 from iOS 14.4.2 if you've already updated your iPhone or iPad. Apple routinely stops signing older versions of software updates after new releases come out in order to encourage ...
Apple Prefer Lightning Over USB C Feature

iPhone Sticking With Lightning Port Over USB-C for 'Foreseeable Future'

Tuesday March 2, 2021 9:32 am PST by
Apple will retain the Lightning connector on the iPhone for the "foreseeable future," with no intention of switching to USB-C, according to reliable analyst Ming-Chi Kuo. In spite of much of the industry moving toward USB-C, Apple will not be using it to replace the Lightning connector on the iPhone 13, or indeed on any iPhone model for the time being. In a note seen by MacRumors yesterday,...
macOS Big Sur Feature Blue

Update to macOS 11.4 NOW - Someone Could Be Spying On You

Sunday May 30, 2021 9:40 am PDT by
Apple's recently released macOS Big Sur 11.4 update addresses a serious security vulnerability, so all users should complete the software update immediately. Jamf, a mobile device management company, raised a major security issue in macOS Big Sur that allowed attackers to piggyback apps like Zoom to surreptitiously take screenshots and record the screen. The exploit allowed a user's Privacy...