One of the major security enhancements Apple has brought to its devices over the years is the Secure Enclave chip, which encrypts and protects all sensitive data stored on the devices. Last month, however, hackers claimed they found a permanent vulnerability in the Secure Enclave, which could put data from iPhone, iPad, and even Mac users at risk.
What is Secure Enclave?
The Secure Enclave is a security coprocessor included with almost every Apple device to provide an extra layer of security. All data stored on iPhone, iPad, Mac, Apple Watch, and other Apple devices is encrypted with random private keys, which are only accessible by the Secure Enclave. These keys are unique to your device and they’re never synchronized with iCloud.
More than just encrypting your files, Secure Enclave is also responsible for storing the keys that manage sensitive data such as passwords, your credit card used by Apple Pay, and even your biometric identification to enable Touch ID and Face ID. This makes it harder for hackers to gain access to your personal data without your password.
It’s important to note that although the Secure Enclave chip is built into the device, it works completely separately from the rest of the system. This ensures that apps won’t have access to your private keys, since they can only send requests to decrypt specific data such as your fingerprint to unlock an app through the Secure Enclave.
Even if you have a jailbroken device with full access to the system’s internal files, everything that’s managed by Secure Enclave remains protected.
These are the devices that currently feature the Secure Enclave chip:
- iPhone 5s and later
- iPad (5th gen) and later
- iPad Air (1st gen) and later
- iPad mini 2 and later
- iPad Pro
- Mac computers with the T1 or T2 chip
- Apple TV HD (4th gen) and later
- Apple Watch Series 1 and later
- HomePod
What changes with an exploit?
This isn’t the first time hackers have encountered vulnerabilities related to Secure Enclave. In 2017, a group of hackers was able to decrypt the Secure Enclave firmware to explore how the component works. However, they were unable to gain access to the private keys, so there wasn’t any risk to users.
Now, Chinese hackers from the Pangu Team have reportedly found an “unpatchable” exploit on Apple’s Secure Enclave chip that could lead to breaking the encryption of private security keys. An unpatchable exploit means that the vulnerability was found in the hardware and not the software, so there’s probably nothing Apple can do to fix it on devices that have already been shipped.
We still don’t have further details on what exactly hackers can do with this specific vulnerability, but having full access to the Security Enclave could also mean having access to passwords, credit cards, and much more. The only thing we know so far is that this vulnerability in Secure Enclave affects all Apple chips between the A7 and A11 Bionic, similar to the checkm8 exploit that allows jailbreak for almost all iOS devices up to iPhone X.
The Team Pangu has found an “unpatchable” vulnerability on the Secure Enclave Processor (SEP) chip in iPhones. https://t.co/9oJYu3k8M4
— Jin Wook Kim (@wugeej) July 29, 2020
Even though Apple has already fixed this security breach with the A12 and A13 Bionic chips, there are still millions of Apple devices running with the A11 Bionic or older chips that could be affected by this exploit. The impacts that this vulnerability found in the Security Enclave will have on users will likely be known in the coming months.
Keep in mind that exploits like this usually require the hacker to have physical access to the device in order to obtain any data, so it’s unlikely that anyone will be able to access your device remotely. An expected scenario is for government agencies to use this security breach on confiscated devices.