KASLR Exploited: Breaking macOS Apple Silicon Kernel Hardening Techniques

Apple has further reinforced KASLR on macOS for Apple Silicon by implementing “double map” kernel isolation, which separates user-space and kernel-space address layouts. The findings, presented at the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS ’24), expose significant weaknesses in Apple’s advanced kernel isolation techniques. Security researchers from Korea University have unveiled a new vulnerability in macOS systems running on Apple Silicon processors. As Apple continues its transition to ARM-based silicon, addressing vulnerabilities like this will be critical to maintaining user trust and system security. This transient execution accesses kernel addresses, leaving detectable traces in the TLB if the address is valid. Breaking KASLR: By systematically probing memory regions, SysBumps identifies valid kernel address ranges and calculates the kernel’s base address with high accuracy. This knowledge enabled them to construct an attack primitive capable of distinguishing valid from invalid kernel addresses. TLB Side-Channel Analysis: Using a reverse-engineered understanding of Apple Silicon’s TLB architecture, attackers employ a “prime+probe” technique to monitor TLB state changes. By measuring access latency, they can distinguish between valid and invalid kernel addresses. While no immediate fix exists yet, Apple’s response will likely shape future defenses against speculative execution attacks on custom silicon platforms. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. SysBumps exploits speculative execution vulnerabilities in macOS system calls. TLB Behavior Modification: Allocating TLB entries for invalid addresses would make it harder for attackers to distinguish valid from invalid addresses. However, the SysBumps attack demonstrates that even these advanced defenses can be bypassed, with researchers achieving a 96.28% success rate across various M-series processors, including the M1, M2, and their Pro and Max variants. The implications are severe: once KASLR is broken, attackers can more easily exploit other vulnerabilities to gain unauthorized access or execute arbitrary code. While beneficial for speed, it has been shown to leave traces in microarchitectural components like the Translation Lookaside Buffer (TLB), which attackers can exploit as side channels. Triggering Speculative Execution: Certain macOS system calls perform validation checks on user-supplied arguments. Partitioning TLBs: Separating TLB entries for user and kernel processes could eliminate shared contention, reducing side-channel leakage. Speculative Execution Fencing: Inserting serializing instructions like DSB and ISB before conditional branches can prevent speculative execution of sensitive code paths. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 13 Feb 2025 08:55:20 +0000


Cyber News related to KASLR Exploited: Breaking macOS Apple Silicon Kernel Hardening Techniques

KASLR Exploited: Breaking macOS Apple Silicon Kernel Hardening Techniques - Apple has further reinforced KASLR on macOS for Apple Silicon by implementing “double map” kernel isolation, which separates user-space and kernel-space address layouts. The findings, presented at the 2024 ACM SIGSAC Conference on ...
4 hours ago Cybersecuritynews.com
CVE-2024-26957 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
CVE-2024-26688 - In the Linux kernel, the following vulnerability has been resolved: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super When configuring a hugetlb filesystem via the fsconfig() syscall, there is a possible NULL dereference in ...
10 months ago Tenable.com
CVE-2022-48664 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
Check Point released hotfix for actively exploited VPN zero-day - MUST READ. Check Point released hotfix for actively exploited VPN zero-day. Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. Critical Fortinet's FortiClient EMS flaw actively exploited in the wild. Apple ...
8 months ago Securityaffairs.com
CISA adds Check Point Quantum Security Gateways and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog - CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog. CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog. CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog. CISA adds ...
8 months ago Securityaffairs.com
Without Interoperability, Apple Customers Will Never Be Secure - Every internet user should have the ability to privately communicate with the people that matter to them, in a secure fashion, using the tools and protocols of their choosing. Apple's iMessage offers end-to-end encrypted messaging for its customers, ...
1 year ago Eff.org
New MOVEit Transfer critical bug is actively exploited - MUST READ. New MOVEit Transfer critical bug is actively exploited. CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog. Critical Fortinet's FortiClient EMS flaw actively exploited in the wild. PoC ...
7 months ago Securityaffairs.com
Award-Winning Centralized Platform Helps Unlock Value Through Simplicity - Network operators need to cater to their customers by delivering services from anywhere between 1G to 100G speeds, while having the ability to aggregate into 400G networks. With the evolution of the network and emergence of more localized and ...
11 months ago Feedpress.me
Purple teaming and the role of threat categorization - Red team assessment, penetration testing, and even purple team assessments are all designed to answer these questions. As attacks get more complex, these assessments struggle to provide comprehensive answers. These assessment services typically test ...
1 year ago Helpnetsecurity.com
Apple fixes Safari WebKit zero-day flaw exploited at Pwn2Own - Apple has released security updates to fix a zero-day vulnerability in the Safari web browser exploited during this year's Pwn2Own Vancouver hacking competition. The company addressed the security flaw on systems running macOS Monterey and macOS ...
8 months ago Bleepingcomputer.com
CVE-2024-56658 - In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-after-free in dst_destroy [1] Issue is in xfrm6_net_init() and xfrm4_net_init() : They copy ...
1 month ago Tenable.com
CVE-2024-50106 - In the Linux kernel, the following vulnerability has been resolved: nfsd: fix race between laundromat and free_stateid There is a race between laundromat handling of revoked delegations and a client sending free_stateid operation. Laundromat thread ...
3 months ago Tenable.com
Apple To Drop Sensor From Some Watch Models - Redesign plan to remove blood-oxygen sensor on certain Apple Watch models is dependent on an appeal court decision. Apple is reportedly prepared to remove the blood-oxygen sensor from certain Apple Watch models, depending on a court decision. The ...
1 year ago Silicon.co.uk
Big Tech to EU: "Drop Dead" - There's just one wrinkle: the Big Tech companies don't want that future, and they're trying their damndest to strangle it in its cradle. Right from the start, it was obvious that the tech giants were going to war against the DMA, and the freedom it ...
8 months ago Eff.org
newsletter Round 473 by Pierluigi Paganini - Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. Microsoft fixed two zero-day bugs exploited in malware attacks. HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks. BianLian group exploits ...
8 months ago Securityaffairs.com
Apple Move iPad Engineering To Vietnam - Fresh reports of Apple shifting manufacturing from China, with iPad product development resources relocated to Vietnam. Apple continues to strengthen its manufacturing and development capabilities outside of mainland China, according to recent media ...
1 year ago Silicon.co.uk
Healthcare firm WebTPA data breach impacted 2.5M individuals - Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog. Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach ...
8 months ago Securityaffairs.com
Sav-Rx data breach impacted over 2.8 million individuals - Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks. Microsoft fixed two zero-day bugs exploited in malware ...
8 months ago Securityaffairs.com
Days After Google, Apple Reveals Exploited Zero-Day in Browser Engine - Apple has patched an actively exploited zero-day bug in its WebKit browser engine for Safari. Actively Exploited Apple yesterday described the vulnerability as something an attacker could exploit to execute arbitrary code on affected systems. ...
1 year ago Darkreading.com
Sophisticated macOS Infostealers Get Past Apple's Built-In Detection - Increasingly sophisticated infostealers are targeting macOS with the capability to evade Apple's built-in malware protection, as attackers are becoming more savvy about how to crack static signature-detection engines like the platform's proprietary ...
1 year ago Darkreading.com
CVE-2019-10639 - The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the ...
1 year ago
Apple Security Update Fixes Zero-Day Webkit Exploits - Apple recommends users update to iOS 17.1.2, iPadOS 17.1.2 and macOS 14.1.2. Google's Threat Analysis Group discovered these security bugs. Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS and macOS; users are advised to update to ...
1 year ago Techrepublic.com
CVE-2021-31532 - NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an ...
2 years ago
Zero-Click Apple Shortcuts Vulnerability Allows Silent Data Theft - A dangerous vulnerability in Apple Shortcuts has surfaced, which could give attackers access to sensitive data across the device without the user being asked to grant permissions. Apple's Shortcuts application, designed for macOS and iOS, is aimed at ...
11 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)