Alarming “Unpatchable” exploit in Apple’s Secure Enclave could put the data of millions of users at risk, per Chinese hackers
Hackers could conceivably leverage the Secure Enclave exploit to steal personal data and biometric info from iOS users (Image source: Panda Security)
According to Pangu Team, a Chinese hacker group, an “unpatchable” exploit has been uncovered for Apple’s Secure Enclave, the co-processor that stores keys for Face ID, Touch ID, and passwords. This potentially puts the personal data and biometric information of millions of iPhone and iPad users at risk.
An alarming report by Chinese hacking group Pangu Team claims that an “unpatchable” exploit has been discovered for Apple’s Secure Enclave chip. If verified, this has serious implications for the data security of millions of iPhone and iPad users.
Secure Enclave is a co-processor Apple uses to store very sensitive user data, like Face ID maps, that isn’t synced to iCloud. The hardware exploit uncovered by Pangu Team requires a hacker to have physical access to an iPhone or iPad. This is a minor relief, since it rules out remote attacks.
However, because it’s a hardware exploit, Apple can’t issue a software patch to rectify it. This means that all iPhones from the iPhone 5S onwards, all iPads from the 5th generation as well as all iPad Airs and iPad Pros are at risk. Apart from iPhones and iPads, all Apple Watches, the HomePod, and many Apple TV and newer Mac models are at risk.
Arjun Krishna - Tech Writer - 623 articles published on Notebookcheck since 2019
I've had a passion for PC gaming since 1996, when I watched my dad score frags in Quake as a 1 year-old. I've gone on to become a Penguin-published author and tech journalist. Apart from working as an editor at Notebookcheck, I write for outlets including TechSpot and Gamingbolt. I’m the Director of Content at Flying V Group, one of the top 5 digital marketing agencies in Orange County. When I'm not traveling the world, gathering stories for my next book, you can find me tinkering with my PC.