Researchers have uncovered two critical vulnerabilities in Apple’s custom silicon chips, dubbed SLAP (Speculative Load Address Prediction) and FLOP (False Load Output Predictions).
These flaws, found in Apple’s A- and M-series processors, expose sensitive user data such as credit card details, location history, and even private email content to potential attackers.
The vulnerabilities affect a wide range of Apple devices, including MacBooks, iPads, and iPhones released since 2021.
Both SLAP and FLOP exploit speculative execution, a performance optimization technique used in modern CPUs to predict and execute instructions ahead of time.
Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free
While this technique boosts processing speed, it also introduces security risks when predictions go wrong.
For instance, researchers demonstrated an attack on Safari where an unprivileged remote adversary could recover private email data.
The research team demonstrated the severity of these vulnerabilities with proof-of-concept attacks:
Proton Mail Inbox Leak: Using FLOP, researchers trained Apple’s M3 CPU via JavaScript running in Safari to access Proton Mail inbox data. They successfully retrieved sender names and subject lines from emails.
Literary Data Extraction: SLAP was used on an M2 chip to recover a secret string containing text from The Great Gatsby. Similarly, FLOP allowed the recovery of text stored in memory but never accessed directly.
The vulnerabilities affect a broad spectrum of Apple devices:
These vulnerabilities compromise hardware-level protections designed to isolate web pages from accessing each other’s data. By exploiting SLAP or FLOP, malicious websites can bypass these safeguards and steal sensitive login-protected information.
While FLOP has actionable mitigations requiring software patches, these fixes are complex and cannot be implemented by end-users.
Apple has acknowledged the issue and plans to release security updates soon. Users are advised to enable automatic updates and ensure their devices are running the latest software versions.
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar