Incident: Unpatchable Mac T2 Chip Vulnerability Exploited for Jailbreaking.

Published Date: 2020-10-06

Postmortem Analysis
Timeline 1. The software failure incident of the Mac vulnerability to bypass Apple's T2 security chip happened before October 6, 2020, as the article discussing the incident was published on that date [Article 105963].
System 1. Apple's trusted T2 security chip 2. macOS and OS X 3. Checkm8 vulnerability 4. System Integrity Protection 5. Secure Boot 6. FileVault encryption keys 7. T2 chip 8. A5 through A11 mobile chipsets 9. T1 chip 10. Activation Lock 11. Find My services 12. Lost Mode enforcement 13. Integrity checking 14. Checkra1n jailbreak tool
Responsible Organization 1. The software failure incident was caused by the vulnerability in Apple's T2 security chip, specifically the Checkm8 vulnerability, which allowed for deep system access and bypassing of security features [105963].
Impacted Organization 1. Apple's trusted T2 security chip was impacted by the software failure incident [105963].
Software Causes 1. The software cause of the failure incident was a vulnerability in the T2 chip used in Macs, specifically the Checkm8 vulnerability, which allowed for deep system access and bypassing of security features [105963].
Non-software Causes 1. The vulnerability in the T2 chip was due to a flaw in low-level, unchangeable code for hardware, making it unpatchable [105963]. 2. The T2 chip itself doesn't reboot every time the device does, which could lead to compromises persisting unless the T2 chip is fully restored to Apple's defaults [105963].
Impacts 1. The software failure incident allowed anyone to exploit an unusual Mac vulnerability to bypass Apple's trusted T2 security chip and gain deep system access, creating a new host of potential threats [Article 105963]. 2. The flaw in the T2 chip is unfixable in every Mac that has a T2 inside, undermining a crucial security feature of newer Macs [Article 105963]. 3. The jailbreak could be weaponized by malicious hackers to disable macOS security features like System Integrity Protection and Secure Boot, install malware, obtain FileVault encryption keys, and decrypt user data [Article 105963]. 4. The software failure incident raised concerns about the basic approach of using a special, trusted chip to secure other processes, as other tech vendors have faced similar vulnerabilities with their secure enclaves [Article 105963].
Preventions 1. Implementing regular security audits and penetration testing to identify and patch vulnerabilities before they can be exploited [105963]. 2. Enhancing physical security measures to prevent unauthorized access to devices, as the exploit required physical access to the target devices [105963]. 3. Developing and implementing a more secure hardware design for the T2 chip to prevent exploitation of low-level, unchangeable code [105963].
Fixes 1. The software failure incident involving the vulnerability in Apple's T2 chip, which allows for deep system access and potential threats, could potentially be fixed by Apple through a hardware redesign or update that addresses the underlying flaw in the T2 chip [105963].
References 1. Checkra1n team member who tweeted about the jailbreak [Article 105963] 2. Checkra1n researchers who discussed the jailbreak with WIRED [Article 105963] 3. Will Strafach, a longtime iOS researcher and creator of the Guardian Firewall app for iOS [Article 105963] 4. Patrick Wardle, an Apple security researcher at the enterprise management firm Jamf and a former NSA researcher [Article 105963] 5. Ang Cui, founder of the embedded device security firm Red Balloon [Article 105963]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the exploitation of the T2 chip vulnerability in Macs has happened again within the same organization, Apple. The Checkm8 vulnerability that allowed jailbreaking of older models of iPhones has now been exploited to bypass the T2 security chip in Macs, creating new potential threats [105963]. (b) The incident of exploiting the T2 chip vulnerability in Macs is not limited to Apple alone. The Checkra1n group, which developed the tool for iOS jailbreaking, has now released support for T2 bypass on Macs as well. Additionally, a T2 vulnerability was publicly disclosed by the Chinese security research and jailbreaking group Pangu Team, indicating that similar incidents have occurred or are being discovered in other organizations or by other research groups [105963].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The vulnerability in the T2 chip, known as Checkm8, was exploited by jailbreakers to gain deep system access on Macs with T2 chips. This flaw was present in the low-level, unchangeable code for hardware, making it unfixable in every Mac that has a T2 chip inside [105963]. (b) The software failure incident related to the operation phase is also highlighted in the article. The Checkra1n tool, developed by the same group that created the tool for iOS, allows attackers to disable macOS security features like System Integrity Protection and Secure Boot, and potentially install malware on compromised devices. However, the tool requires physical access to target devices over USB, and the compromise is not persistent, ending when the T2 chip is rebooted [105963].
Boundary (Internal/External) within_system (a) The software failure incident described in the article is within the system. The vulnerability in the T2 chip, known as Checkm8, allows for deep system access and bypassing of Apple's security mechanisms [105963]. This flaw originates from within the system itself, making it unfixable in every Mac that has a T2 chip inside. Additionally, the jailbreak tool developed by the Checkra1n group exploits this vulnerability to disable macOS security features and potentially install malware, highlighting the internal nature of the software failure incident.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case is primarily due to non-human actions, specifically a vulnerability in the T2 chip that is unfixable in every Mac that has a T2 inside. The flaw, known as Checkm8, allows for deep system access and bypassing of Apple's security mechanisms [105963]. (b) However, human actions also play a role in this incident as the jailbreak tool developed by the Checkra1n group is being used to exploit the vulnerability in the T2 chip. This tool can be used by malicious hackers to disable macOS security features and install malware, highlighting the potential harm that can be caused by human actions in exploiting software vulnerabilities [105963].
Dimension (Hardware/Software) hardware, software (a) The software failure incident reported in the article is related to hardware. The vulnerability in the T2 chip, which is a hardware component in Macs, allows for deep system access and bypassing of security features. The flaw in the T2 chip, known as Checkm8, is unfixable as it is in low-level, unchangeable code for hardware. The T2 chip was supposed to provide extra security features like encrypted data storage, Touch ID, and Activation Lock, but the vulnerability undermines these security measures [105963]. (b) The software failure incident is also related to software. The Checkra1n tool developed by the Checkra1n group allows for the exploitation of the T2 chip vulnerability to bypass macOS security features like System Integrity Protection and Secure Boot, and potentially install malware. The tool can be used to run Linux on the T2 chip or play Doom on a MacBook Pro's Touch Bar. The jailbreak tool itself is a software exploit that takes advantage of the vulnerability in the T2 chip [105963].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is malicious in nature. The incident involves the exploitation of a vulnerability in Apple's T2 security chip by a group of researchers to develop a tool that allows for jailbreaking Mac devices. This tool can be used by malicious hackers to disable macOS security features, install malware, obtain encryption keys, and decrypt user data [105963]. The exploit undermines a crucial security feature of newer Macs and raises concerns about potential insider threats and device theft [105963]. (b) The incident is not non-malicious as it involves intentional exploitation of vulnerabilities in the T2 chip for unauthorized access and potential harm to the system and user data.
Intent (Poor/Accidental Decisions) poor_decisions The software failure incident described in the article is related to poor decisions made by Apple in implementing the T2 chip's security features. The vulnerability in the T2 chip, known as Checkm8, was exploited by jailbreakers, leading to the bypass of security mechanisms like System Integrity Protection and Secure Boot [105963]. This vulnerability was unfixable in every Mac that has a T2 chip inside, highlighting a poor decision in the design and implementation of the chip's security features. Additionally, the article mentions that the T2 chip was supposed to provide extra security but is now considered moot due to the exploit, indicating a failure in the initial decision-making process regarding the chip's security [105963].
Capability (Incompetence/Accidental) accidental (a) The software failure incident in the article is not related to development incompetence. The vulnerability in the T2 chip that allowed for the jailbreak was a result of a flaw in low-level, unchangeable code for hardware, making it unfixable in every Mac that has a T2 inside [105963]. (b) The software failure incident in the article is more aligned with an accidental failure. The vulnerability in the T2 chip that allowed for the jailbreak was not intentionally created by the developers but was discovered and exploited by researchers, leading to potential threats and security risks [105963].
Duration permanent The software failure incident described in the article is more of a permanent nature. The vulnerability in the T2 chip, known as Checkm8, is unfixable in every Mac that has a T2 inside [105963]. The flaw is in low-level, unchangeable code for hardware, making it ultimately unfixable [105963]. Additionally, the T2 chip was supposed to provide extra security but is now considered moot due to the exploit [105963]. The Checkra1n jailbreak tool allows researchers to probe the T2 chip and explore its security features, indicating a long-term vulnerability [105963].
Behaviour other (a) crash: The software failure incident described in the article does not involve a crash where the system loses state and does not perform any of its intended functions. The incident is related to a vulnerability in Apple's T2 security chip that allows for deep system access and potential exploitation by hackers [Article 105963]. (b) omission: The software failure incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s). Instead, the incident revolves around a vulnerability in the T2 chip that can be exploited to bypass security features and gain unauthorized access to the system [Article 105963]. (c) timing: The software failure incident is not related to a failure due to the system performing its intended functions correctly but too late or too early. The focus is on the vulnerability in the T2 chip that can be exploited by malicious actors to disable security features and potentially install malware on Mac devices [Article 105963]. (d) value: The software failure incident does not involve a failure due to the system performing its intended functions incorrectly. The issue lies in the vulnerability of the T2 chip that allows for unauthorized access and potential security breaches on Mac devices [Article 105963]. (e) byzantine: The software failure incident does not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. The primary concern is the exploitability of the T2 chip that could lead to compromising the security features of Mac devices [Article 105963]. (f) other: The behavior of the software failure incident can be categorized as a security vulnerability that allows for unauthorized access and potential exploitation of the T2 chip in Mac devices. This vulnerability poses a significant threat to the security and integrity of the affected systems [Article 105963].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence harm, property, theoretical_consequence (a) unknown (b) unknown (c) unknown (d) unknown (e) unknown (f) unknown (g) no_consequence (h) harm: The software failure incident allowed potential hackers to disable macOS security features like System Integrity Protection and Secure Boot, install malware, obtain FileVault encryption keys, and decrypt user data, which could harm users' data security and privacy [105963]. (i) theoretical_consequence: The software failure incident could potentially be used by attackers to create in-memory implants that disappear on reboot, making it difficult for victims to track down the malware [105963].
Domain information, finance (a) The software failure incident reported in the article is related to the information industry, specifically affecting Apple's macOS and OS X systems due to a vulnerability in the T2 security chip [Article 105963]. (h) The incident also has implications for the finance industry as the jailbreak could potentially disable macOS security features like System Integrity Protection and Secure Boot, which are crucial for protecting financial data and transactions [Article 105963]. (m) The software failure incident is not directly related to any other industry mentioned in the options provided.

Sources

Back to List