Apple iPhone users are facing new security concerns after researchers demonstrated a hack targeting the iPhone’s USB-C controller.
Thomas Roth, a security researcher, showed how Apple’s ACE3 USB-C controller, used in the iPhone 15, can be exploited to bypass security protections.
The ACE3 controller manages USB power and functions as a microcontroller for the iPhone.
Roth used reverse engineering and other techniques to gain code execution on the ACE3, allowing him to analyze its vulnerabilities.
The hack mainly affects iPhones and MacBooks using the ACE3 controller. While not an immediate threat, it could lead to the discovery of future vulnerabilities.
Roth reported the vulnerabilities to Apple. For the ACE2 attack, Apple promised a fix.
For ACE3, Apple downplayed the threat, though Roth warned that his research could uncover more security flaws.
iPhone users should stay alert for updates and security patches from Apple.