Previous All Posts Next

Checkm8 Exploit: Permanent Apple Bootrom Vulnerability

Posted: September 30, 2019 to News.

Tags: Malware, Compliance, Data Breach

A security researcher who goes by the Twitter handle "axi0mX" announced on Friday that there is a permanent Bootrom vulnerability “checkm8” in Apple iOS. The flaw enables bypassing the security protections present in most Apple mobile devices. Downside: cannot be patched. Upside: physical access is needed to exploit it and a system restart erases any backdoor access. If run successfully, ”checkm8” enables installation of arbitrary code that hasn't been approved by Apple - potentially including malware or surveillance software - onto an iOS device. Most generations of iPhones and iPads are vulnerable, as well as some watches and Apple TV products, but devices using Apple A12 and late chips are immune. Thomas Reed, a Mac expert at Malwarebytes, states that the exploit “targets a flaw in the bootrom - aka called "SecureROM" - which is code on a read-only memory chip that iOS loads during startup”, something that Apple says is literally created during chip fabrication. The risk is perhaps greater for those in areas with few legal protections against government-promulgated surveillance efforts, border areas, immigration zones, and border crossings. It also may give law enforcement a way to unlock phones in emergency situations. "For law enforcement, and the companies that help them unlock iPhones, this is huge,” states Reed. "The checkm8 exploit would need to be chained together with other vulnerabilities to be useful, but would be attractive as a link in the chain since it cannot be patched by Apple." "It is likely at least a couple other researchers were able to exploit this vulnerability after discovering the patch," axi0mX writes on Twitter. "The patch is easy to find, but the vulnerability is not trivial to exploit on most devices." The exploit is another example of ways that security remains challenging. Reed updated his blog after having a lengthy conversation with axi0mX. “I'm less concerned about it now, although think it could still be used maliciously,” he Tweets. “But I also think the benefits are probably greater for security researchers than the risks are to average users.”

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Need Cybersecurity or Compliance Help?

Schedule a free consultation with our cybersecurity experts to discuss your security needs.

Schedule Free Consultation
Previous All Posts Next
Free cybersecurity consultation available Schedule Now