KASLR Exploited: Breaking macOS Apple Silicon Kernel Hardening Techniques

Apple has further reinforced KASLR on macOS for Apple Silicon by implementing “double map” kernel isolation, which separates user-space and kernel-space address layouts. The findings, presented at the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS ’24), expose significant weaknesses in Apple’s advanced kernel isolation techniques. Security researchers from Korea University have unveiled a new vulnerability in macOS systems running on Apple Silicon processors. As Apple continues its transition to ARM-based silicon, addressing vulnerabilities like this will be critical to maintaining user trust and system security. This transient execution accesses kernel addresses, leaving detectable traces in the TLB if the address is valid. Breaking KASLR: By systematically probing memory regions, SysBumps identifies valid kernel address ranges and calculates the kernel’s base address with high accuracy. This knowledge enabled them to construct an attack primitive capable of distinguishing valid from invalid kernel addresses. TLB Side-Channel Analysis: Using a reverse-engineered understanding of Apple Silicon’s TLB architecture, attackers employ a “prime+probe” technique to monitor TLB state changes. By measuring access latency, they can distinguish between valid and invalid kernel addresses. While no immediate fix exists yet, Apple’s response will likely shape future defenses against speculative execution attacks on custom silicon platforms. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. SysBumps exploits speculative execution vulnerabilities in macOS system calls. TLB Behavior Modification: Allocating TLB entries for invalid addresses would make it harder for attackers to distinguish valid from invalid addresses. However, the SysBumps attack demonstrates that even these advanced defenses can be bypassed, with researchers achieving a 96.28% success rate across various M-series processors, including the M1, M2, and their Pro and Max variants. The implications are severe: once KASLR is broken, attackers can more easily exploit other vulnerabilities to gain unauthorized access or execute arbitrary code. While beneficial for speed, it has been shown to leave traces in microarchitectural components like the Translation Lookaside Buffer (TLB), which attackers can exploit as side channels. Triggering Speculative Execution: Certain macOS system calls perform validation checks on user-supplied arguments. Partitioning TLBs: Separating TLB entries for user and kernel processes could eliminate shared contention, reducing side-channel leakage. Speculative Execution Fencing: Inserting serializing instructions like DSB and ISB before conditional branches can prevent speculative execution of sensitive code paths. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 13 Feb 2025 08:55:20 +0000


Cyber News related to KASLR Exploited: Breaking macOS Apple Silicon Kernel Hardening Techniques

KASLR Exploited: Breaking macOS Apple Silicon Kernel Hardening Techniques - Apple has further reinforced KASLR on macOS for Apple Silicon by implementing “double map” kernel isolation, which separates user-space and kernel-space address layouts. The findings, presented at the 2024 ACM SIGSAC Conference on ...
3 months ago Cybersecuritynews.com
CVE-2024-26957 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-26688 - In the Linux kernel, the following vulnerability has been resolved: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super When configuring a hugetlb filesystem via the fsconfig() syscall, there is a possible NULL dereference in ...
1 year ago Tenable.com
CVE-2022-49123 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
Mitigating macOS Zero-Day Risks - Tools and Techniques - As macOS zero-day threats grow more sophisticated, combining Apple’s built-in protections with third-party security tools and rigorous security practices provides the most comprehensive defense strategy. These third-party solutions are ...
2 weeks ago Cybersecuritynews.com CVE-2024-44243
Check Point released hotfix for actively exploited VPN zero-day - MUST READ. Check Point released hotfix for actively exploited VPN zero-day. Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. Critical Fortinet's FortiClient EMS flaw actively exploited in the wild. Apple ...
1 year ago Securityaffairs.com CVE-2024-23222 CVE-2023-22515 CVE-2023-40044 CVE-2023-20109
CVE-2024-44989 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
Without Interoperability, Apple Customers Will Never Be Secure - Every internet user should have the ability to privately communicate with the people that matter to them, in a secure fashion, using the tools and protocols of their choosing. Apple's iMessage offers end-to-end encrypted messaging for its customers, ...
1 year ago Eff.org
Web Server Hardening Best Practices For Organizations Across Industries - This checklist should include securing server location and physical access controls, user account management and access permissions, firewall configuration and network security settings, removal of unnecessary software and services, configuration of ...
1 month ago Cybersecuritynews.com
CVE-2022-48664 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CISA adds Check Point Quantum Security Gateways and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog - CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog. CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog. CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog. CISA adds ...
1 year ago Securityaffairs.com
New MOVEit Transfer critical bug is actively exploited - MUST READ. New MOVEit Transfer critical bug is actively exploited. CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog. Critical Fortinet's FortiClient EMS flaw actively exploited in the wild. PoC ...
11 months ago Securityaffairs.com CVE-2020-3259 CVE-2023-22515 CVE-2023-40044 CVE-2023-20109 Rocke
Award-Winning Centralized Platform Helps Unlock Value Through Simplicity - Network operators need to cater to their customers by delivering services from anywhere between 1G to 100G speeds, while having the ability to aggregate into 400G networks. With the evolution of the network and emergence of more localized and ...
1 year ago Feedpress.me
How To Implementing MITRE ATT&CK In SOC Workflows - A Step-by-Step Guide - By understanding the framework, mapping your current capabilities, developing targeted detection and response strategies, and integrating ATT&CK into your tools and processes, you can build a proactive, threat-informed defense that evolves ...
1 month ago Cybersecuritynews.com
Apple fixes Safari WebKit zero-day flaw exploited at Pwn2Own - Apple has released security updates to fix a zero-day vulnerability in the Safari web browser exploited during this year's Pwn2Own Vancouver hacking competition. The company addressed the security flaw on systems running macOS Monterey and macOS ...
1 year ago Bleepingcomputer.com CVE-2024-27834
Apple To Drop Sensor From Some Watch Models - Redesign plan to remove blood-oxygen sensor on certain Apple Watch models is dependent on an appeal court decision. Apple is reportedly prepared to remove the blood-oxygen sensor from certain Apple Watch models, depending on a court decision. The ...
1 year ago Silicon.co.uk
Big Tech to EU: "Drop Dead" - There's just one wrinkle: the Big Tech companies don't want that future, and they're trying their damndest to strangle it in its cradle. Right from the start, it was obvious that the tech giants were going to war against the DMA, and the freedom it ...
1 year ago Eff.org Inception
CVE-2022-49248 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
Hardening Windows Servers - Top Strategies to Prevent Exploits in 2025 - By leveraging the default security enhancements in Windows Server 2025 alongside strategic implementations of Application Control, Attack Surface Reduction, and proper credential management, organizations can significantly reduce their risk exposure ...
2 weeks ago Cybersecuritynews.com
Purple teaming and the role of threat categorization - Red team assessment, penetration testing, and even purple team assessments are all designed to answer these questions. As attacks get more complex, these assessments struggle to provide comprehensive answers. These assessment services typically test ...
1 year ago Helpnetsecurity.com
macOS Security Guide- Safeguarding Against Adware and Malware - While Apple’s built-in defenses, such as XProtect and Gatekeeper, remain critical, 2024 has exposed vulnerabilities in user behavior and emerging attack vectors leveraging artificial intelligence (AI). As MaaS economies flourish, only layered ...
2 weeks ago Cybersecuritynews.com
Apple Move iPad Engineering To Vietnam - Fresh reports of Apple shifting manufacturing from China, with iPad product development resources relocated to Vietnam. Apple continues to strengthen its manufacturing and development capabilities outside of mainland China, according to recent media ...
1 year ago Silicon.co.uk
newsletter Round 473 by Pierluigi Paganini - Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. Microsoft fixed two zero-day bugs exploited in malware attacks. HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks. BianLian group exploits ...
1 year ago Securityaffairs.com CVE-2020-3259 CVE-2023-46747 CVE-2023-46748 CVE-2023-22515 APT29 Rocke BianLian
2 Apple iPhone Zero-Day Vulnerabilities Actively Exploited in Extremely Sophisticated Attacks - Apple has released iOS 18.4.1 and iPadOS 18.4.1 to address two critical zero-day vulnerabilities that were actively exploited in highly targeted, sophisticated attacks against specific individuals iPhone. The vulnerabilities, identified in the ...
1 month ago Cybersecuritynews.com CVE-2025-31201
Days After Google, Apple Reveals Exploited Zero-Day in Browser Engine - Apple has patched an actively exploited zero-day bug in its WebKit browser engine for Safari. Actively Exploited Apple yesterday described the vulnerability as something an attacker could exploit to execute arbitrary code on affected systems. ...
1 year ago Darkreading.com CVE-2024-23222