Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

This USB-C hack might leave your iPhone exposed

The research involves reverse engineering the controller's firmware and employing techniques such as side-channel analysis and electromagnetic fault injection to achieve code execution on the ACE3

byKerem Gülen
January 13, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Apple users face new security challenges after security researcher Thomas Roth successfully hacked the ACE3 USB-C controller in the iPhone 15 series, as disclosed at the 38th Chaos Communication Congress in December 2024. The hack highlights vulnerabilities in Apple’s USB-C implementation.

Apple users face security risks after ACE3 hack discovery

The ACE3 custom USB-C controller is responsible for managing USB power delivery and data transfer in Apple devices. Roth’s research involved reverse engineering the controller’s firmware and employing techniques such as side-channel analysis and electromagnetic fault injection to achieve code execution on the ACE3. This allowed him to dump the ROM and analyze the controller’s functionality.

Roth explained that the ACE3 controller is a “full microcontroller running a full USB stack connected to some of the internal busses of the device.” He found that the vulnerabilities resulted from insufficient safeguards in the controller’s firmware, which could allow attackers to gain low-level access via specially crafted USB-C cables or devices. Once compromised, the ACE3 could be manipulated to emulate trusted accessories or execute unauthorized commands.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


A new iPhone is coming and it’s the thinnest yet


Consequently, the integration of the ACE3 with Apple’s internal systems poses significant risks, potentially enabling untethered jailbreaks or persistent firmware implants that could compromise the main operating system. Hackers could also exploit these vulnerabilities to intercept sensitive data during transfers or manipulate devices without user consent.

Roth emphasized that while the findings primarily affect iPhone and MacBook users, this research serves as foundational work for uncovering broader security flaws in smartphone hardware. Roth contacted Apple regarding both the earlier ACE2 and the ACE3 attack. Initially, Apple confirmed it would address the ACE2 issue but later deemed it a hardware problem. Regarding the ACE3, Roth noted that Apple acknowledged the complexity of the hack but did not view it as an immediate threat.

Despite the complexity of the hack, experts warn that it may only be a matter of time before malicious actors attempt to exploit these vulnerabilities. Apple has not yet provided a timeline for addressing the issues with the ACE3 controller. In the meantime, users are advised to remain cautious about potential unauthorized access and manipulation of their devices.


Featured image credit: Marcus Urbenz/Unsplash

Tags: iPhone

Related Posts

Xbox Developer Direct returns January 22 with Fable and Forza Horizon 6

Xbox Developer Direct returns January 22 with Fable and Forza Horizon 6

January 9, 2026
Dell debuts disaggregated infrastructure for modern data centers

Dell debuts disaggregated infrastructure for modern data centers

January 9, 2026
TikTok scores partnership with FIFA for World Cup highlights

TikTok scores partnership with FIFA for World Cup highlights

January 9, 2026
YouTube now lets you hide Shorts in search results

YouTube now lets you hide Shorts in search results

January 9, 2026
Google transforms Gmail with AI Inbox and natural language search

Google transforms Gmail with AI Inbox and natural language search

January 9, 2026
Disney+ to launch TikTok-style short-form video feed in the US

Disney+ to launch TikTok-style short-form video feed in the US

January 9, 2026

LATEST NEWS

Xbox Developer Direct returns January 22 with Fable and Forza Horizon 6

Dell debuts disaggregated infrastructure for modern data centers

TikTok scores partnership with FIFA for World Cup highlights

YouTube now lets you hide Shorts in search results

Google transforms Gmail with AI Inbox and natural language search

Disney+ to launch TikTok-style short-form video feed in the US

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.