Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

This USB-C hack might leave your iPhone exposed

The research involves reverse engineering the controller's firmware and employing techniques such as side-channel analysis and electromagnetic fault injection to achieve code execution on the ACE3

byKerem Gülen
January 13, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Apple users face new security challenges after security researcher Thomas Roth successfully hacked the ACE3 USB-C controller in the iPhone 15 series, as disclosed at the 38th Chaos Communication Congress in December 2024. The hack highlights vulnerabilities in Apple’s USB-C implementation.

Apple users face security risks after ACE3 hack discovery

The ACE3 custom USB-C controller is responsible for managing USB power delivery and data transfer in Apple devices. Roth’s research involved reverse engineering the controller’s firmware and employing techniques such as side-channel analysis and electromagnetic fault injection to achieve code execution on the ACE3. This allowed him to dump the ROM and analyze the controller’s functionality.

Roth explained that the ACE3 controller is a “full microcontroller running a full USB stack connected to some of the internal busses of the device.” He found that the vulnerabilities resulted from insufficient safeguards in the controller’s firmware, which could allow attackers to gain low-level access via specially crafted USB-C cables or devices. Once compromised, the ACE3 could be manipulated to emulate trusted accessories or execute unauthorized commands.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


A new iPhone is coming and it’s the thinnest yet


Consequently, the integration of the ACE3 with Apple’s internal systems poses significant risks, potentially enabling untethered jailbreaks or persistent firmware implants that could compromise the main operating system. Hackers could also exploit these vulnerabilities to intercept sensitive data during transfers or manipulate devices without user consent.

Roth emphasized that while the findings primarily affect iPhone and MacBook users, this research serves as foundational work for uncovering broader security flaws in smartphone hardware. Roth contacted Apple regarding both the earlier ACE2 and the ACE3 attack. Initially, Apple confirmed it would address the ACE2 issue but later deemed it a hardware problem. Regarding the ACE3, Roth noted that Apple acknowledged the complexity of the hack but did not view it as an immediate threat.

Despite the complexity of the hack, experts warn that it may only be a matter of time before malicious actors attempt to exploit these vulnerabilities. Apple has not yet provided a timeline for addressing the issues with the ACE3 controller. In the meantime, users are advised to remain cautious about potential unauthorized access and manipulation of their devices.


Featured image credit: Marcus Urbenz/Unsplash

Tags: iPhone

Related Posts

Is Twitter down? Users report access issues as X won’t open

Is Twitter down? Users report access issues as X won’t open

January 16, 2026
Paramount+ raises subscription prices and terminates free trials for 2026

Paramount+ raises subscription prices and terminates free trials for 2026

January 16, 2026
Capcom reveals Resident Evil Requiem gameplay and February release date

Capcom reveals Resident Evil Requiem gameplay and February release date

January 16, 2026
Mother of one of Elon Musk’s children sues xAI over sexual Grok deepfakes

Mother of one of Elon Musk’s children sues xAI over sexual Grok deepfakes

January 16, 2026
Samsung revamps Mobile Gaming Hub to fix broken game discovery

Samsung revamps Mobile Gaming Hub to fix broken game discovery

January 16, 2026
Bluesky launches Live Now badge and cashtags in major update

Bluesky launches Live Now badge and cashtags in major update

January 16, 2026

LATEST NEWS

Is Twitter down? Users report access issues as X won’t open

Paramount+ raises subscription prices and terminates free trials for 2026

Capcom reveals Resident Evil Requiem gameplay and February release date

Mother of one of Elon Musk’s children sues xAI over sexual Grok deepfakes

Samsung revamps Mobile Gaming Hub to fix broken game discovery

Bluesky launches Live Now badge and cashtags in major update

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.