A significant security vulnerability has been identified in Apple’s M-series chips, enabling potential attackers to extract cryptographic keys integral to secure data operations. Known as GoFetch, this flaw relates to a microarchitectural side-channel attack that exploits the data memory-dependent prefetcher (DMP), specifically targeting constant-time cryptography implementations to covertly access sensitive data stored within the CPU cache. Apple was informed of this vulnerability in December 2023.

Prefetchers serve as a hardware optimization tool, predicting future memory addresses that an active program may access and preloading the appropriate data from main memory to reduce access latency. The DMP, a specific type of prefetcher, elevates this process by considering pre-existing memory contents and their access patterns, rendering it particularly vulnerable to cache-based attacks that can manipulate the prefetcher into revealing protected data belonging to a victim process.

Building on prior research involving the Augury attack, which similarly utilized DMP for data leakage, the GoFetch vulnerability illustrates how DMP can erroneously activate and attempt to dereference memory that resembles pointer structures. A research team comprising experts from multiple prestigious universities highlighted that this breach fundamentally violates the tenets of constant-time programming, which dictates strict separation of data and memory access patterns.

The mechanism for exploitation necessitates that both the victim and attacker operate on the same machine and within the same CPU cluster, enabling the attacker to lure a target into installing a malicious application that leverages GoFetch. While the attacker doesn’t share memory with the victim, they can still monitor available microarchitectural side channels, such as cache latency.

GoFetch underscores a crucial vulnerability: even when a victim successfully segregates access patterns according to constant-time paradigms, the DMP can induce secret-dependent memory access that inadvertently benefits the attacker, thereby opening pathways for key extraction. In effect, an attacker could manipulate the prefetching process to capture sensitive data, seriously undermining the security architecture intended to protect against timing side-channel attacks.

The researchers noted that the aggressiveness of DMP exceeds prior expectations, significantly amplifying security risks. This fundamental flaw’s inherent nature renders it unfixable within existing Apple CPUs, compelling developers of cryptographic libraries to implement preventative measures, though such fixes may incur performance trade-offs. Concurrently, users are encouraged to maintain up-to-date systems to mitigate potential risks.

With regard to Apple’s M3 chips, the introduction of data-independent timing (DIT) has demonstrated effectiveness in disabling DMP, a feature not available in prior M1 and M2 processors. Apple has affirmed that enabling DIT ensures that the processor executes certain instructions consistently, irrespective of input variations, which enhances protection against timing leaks. However, developers are still advised to minimize reliance on conditional branch statements that depend on secret data, further safeguarding against attacks leveraging microarchitectural state observations.

As this vulnerability unfolds, it coincides with new research from the Graz University of Technology and the University of Rennes, revealing a novel graphics processing unit (GPU) attack capable of extracting sensitive information through specially crafted JavaScript. This attack, described as the first of its kind executed from within a browser, raises additional challenges to secure data processing across all operating systems and browsers that incorporate the WebGPU standard.

As cybersecurity threats continue to evolve, the implications of these vulnerabilities emphasize the critical need for robust security measures and ongoing vigilance among business owners. Emphasizing the risks inherent in co-locational exploitation on shared machines, organizations must remain aware of the tactics and techniques identified in the MITRE ATT&CK framework to improve their defenses against potential attacks.

Source link