Summary: Security researchers have discovered a new attack, “SysBumps,” that effectively bypasses Kernel Address Space Layout Randomization (KASLR) on macOS running on Apple Silicon processors. This attack exploits speculative execution vulnerabilities during system calls, allowing unprivileged attackers to reveal critical kernel memory addresses. The vulnerability, identified as CVE-2024-54531, poses significant risks to macOS security, particularly for devices within sensitive environments.
Affected: Apple Silicon devices (M1, M1 Pro, M2, M2 Pro, M2 Max, M3, M3 Pro) and macOS versions 13.1 – 15.1
Keypoints :
- SysBumps exploits speculative execution vulnerabilities in macOS to bypass KASLR.
- The attack has a high accuracy rate of 96.28% across Apple’s M-series processors.
- A proof-of-concept exploit is available on GitHub, prompting immediate updates from users to mitigate risks.