Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

This USB-C hack might leave your iPhone exposed

The research involves reverse engineering the controller's firmware and employing techniques such as side-channel analysis and electromagnetic fault injection to achieve code execution on the ACE3

byKerem Gülen
January 13, 2025
in Cybersecurity, News
Home News Cybersecurity

Apple users face new security challenges after security researcher Thomas Roth successfully hacked the ACE3 USB-C controller in the iPhone 15 series, as disclosed at the 38th Chaos Communication Congress in December 2024. The hack highlights vulnerabilities in Apple’s USB-C implementation.

Apple users face security risks after ACE3 hack discovery

The ACE3 custom USB-C controller is responsible for managing USB power delivery and data transfer in Apple devices. Roth’s research involved reverse engineering the controller’s firmware and employing techniques such as side-channel analysis and electromagnetic fault injection to achieve code execution on the ACE3. This allowed him to dump the ROM and analyze the controller’s functionality.

Roth explained that the ACE3 controller is a “full microcontroller running a full USB stack connected to some of the internal busses of the device.” He found that the vulnerabilities resulted from insufficient safeguards in the controller’s firmware, which could allow attackers to gain low-level access via specially crafted USB-C cables or devices. Once compromised, the ACE3 could be manipulated to emulate trusted accessories or execute unauthorized commands.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


A new iPhone is coming and it’s the thinnest yet


Consequently, the integration of the ACE3 with Apple’s internal systems poses significant risks, potentially enabling untethered jailbreaks or persistent firmware implants that could compromise the main operating system. Hackers could also exploit these vulnerabilities to intercept sensitive data during transfers or manipulate devices without user consent.

Roth emphasized that while the findings primarily affect iPhone and MacBook users, this research serves as foundational work for uncovering broader security flaws in smartphone hardware. Roth contacted Apple regarding both the earlier ACE2 and the ACE3 attack. Initially, Apple confirmed it would address the ACE2 issue but later deemed it a hardware problem. Regarding the ACE3, Roth noted that Apple acknowledged the complexity of the hack but did not view it as an immediate threat.

Despite the complexity of the hack, experts warn that it may only be a matter of time before malicious actors attempt to exploit these vulnerabilities. Apple has not yet provided a timeline for addressing the issues with the ACE3 controller. In the meantime, users are advised to remain cautious about potential unauthorized access and manipulation of their devices.


Featured image credit: Marcus Urbenz/Unsplash

Tags: iPhone

Related Posts

Is Grok 5 a revolution in AI or just Elon Musk’s latest overhyped vision?

Is Grok 5 a revolution in AI or just Elon Musk’s latest overhyped vision?

September 3, 2025
ICMP: Gemini, Claude and Llama 3 used music without any license

ICMP: Gemini, Claude and Llama 3 used music without any license

September 3, 2025
YouTube Premium cracks down on out-of-home family plans

YouTube Premium cracks down on out-of-home family plans

September 3, 2025
J-ENG unveils 7UEC50LSJA-HPSCR ammonia ship engine

J-ENG unveils 7UEC50LSJA-HPSCR ammonia ship engine

September 3, 2025
Judge rules Google won’t have to sell Chrome browser

Judge rules Google won’t have to sell Chrome browser

September 3, 2025
ShinyHunters uses vishing to breach Salesforce data

ShinyHunters uses vishing to breach Salesforce data

September 3, 2025

LATEST NEWS

Is Grok 5 a revolution in AI or just Elon Musk’s latest overhyped vision?

ICMP: Gemini, Claude and Llama 3 used music without any license

YouTube Premium cracks down on out-of-home family plans

J-ENG unveils 7UEC50LSJA-HPSCR ammonia ship engine

Judge rules Google won’t have to sell Chrome browser

ShinyHunters uses vishing to breach Salesforce data

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.