cognitive cybersecurity intelligence

News and Analysis

Search

Breaking macOS Apple Silicon Kernel Hardening: KASLR Exploited

Korea University security researchers have uncovered a new attack, SysBumps, that can bypass the Kernel Address Space Layout Randomization (KASLR) in macOS systems using Apple Silicon processors. This marks the first successful breach of KASLR on Apple’s ARM-based architecture, highlighting significant kernel hardening vulnerabilities. SysBumps uses speculative execution to breach kernel isolation, achieving about 96.28% precision in three seconds across various M-series processors and macOS versions. Apple is investigating the issue.

Source: gbhackers.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts