{"id":100169,"date":"2024-04-05T09:58:11","date_gmt":"2024-04-05T16:58:11","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=100169"},"modified":"2024-07-12T17:54:22","modified_gmt":"2024-07-13T00:54:22","slug":"unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/","title":{"rendered":"&#8220;Unpatchable&#8221; flaw in Apple M1\/M2\/M3 chips: GoFetch is the new Spectre"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-100179 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-600x300-v2.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>A recently discovered flaw in M-series Apple silicon chips could allow attackers to break Macs&#8217; security, according to researchers. &#8220;GoFetch&#8221; is an attack method targeting data memory-depending prefetchers (DMP). Apple&#8217;s M1, M2, and M3 series chips all include this feature\u2014and there&#8217;s no way to disable it for M1 or M2.<\/p>\n<p>Here&#8217;s everything you need to know about GoFetch and how it might affect you.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#what\">What is the GoFetch attack, and how could it affect Macs?<\/a><\/li>\n<li><a href=\"#impact\">Does the flaw impact M1 or M2 iPads, or Apple Vision Pro?<\/a><\/li>\n<li><a href=\"#fix\">Does Apple know about the flaw, and will Apple fix it?<\/a><\/li>\n<li><a href=\"#exploited\">Have attackers exploited GoFetch in the wild?<\/a><\/li>\n<li><a href=\"#worried\">Should I be worried about GoFetch?<\/a><\/li>\n<li><a href=\"#malware\">Could malware leverage GoFetch? How can I keep my Mac safe?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"what\"><\/a><\/li>\n<\/ul>\n<h3>What is the GoFetch attack, and how could it affect Macs?<\/h3>\n<p>DMP is a feature that speeds up CPU processing by predicting the next memory address that an app will access.<\/p>\n<p>GoFetch is a side-channel attack that builds on concepts from the &#8220;Augury&#8221; exploit of 2022. (We discussed Augury in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-airtags-one-year-on-intego-mac-podcast-episode-238\/\">episode 238<\/a> of the Intego Mac Podcast.) GoFetch can exploit a flaw in DMP to extract secret keys from constant-time implementations of various cryptographic algorithms. Concerningly, this includes both classical as well as modern, post-quantum cryptographic algorithms.<\/p>\n<p>In effect, the results are similar in concept to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/speculative-execution\/\">speculative execution<\/a> vulnerabilities like <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\">Spectre<\/a>. By exploiting a feature that&#8217;s intended to improve processing speed, attackers can do potentially malicious things. In this case, they can extract private encryption keys.<a name=\"impact\"><\/a><\/p>\n<h3>Does the flaw impact M1 or M2 iPads, or Apple Vision Pro?<\/h3>\n<p>The researchers did not mention iPads or Apple Vision Pro. However, given that they share the same M1 or M2 processors as Macs, it should theoretically be possible to exploit the same vulnerability on these Apple products, too.<a name=\"fix\"><\/a><\/p>\n<h3>Does Apple know about the flaw, and will Apple fix it?<\/h3>\n<p>Apple has known about GoFetch since December 5, 2023. So far, Apple has not made any public statement about GoFetch.<\/p>\n<p>As for whether Apple will attempt to mitigate the vulnerability, we can only speculate. However, it seems somewhat unlikely that Apple will try to mitigate the flaw through software patches\u2014unless a threat actor begins exploiting GoFetch in the wild. Why? For one thing, disabling DMP entirely would cause &#8220;heavy performance penalties,&#8221; according to the researchers. Not only that, but it &#8220;is likely not possible on M1 and M2 CPUs.&#8221; Another potential mitigation\u2014only running cryptographic code on Icestorm (efficiency) CPU cores\u2014would also &#8220;likely incur a significant performance penalty.&#8221;<\/p>\n<p>The researchers suggest that developers of cryptography libraries can mitigate the flaw on M3 processors by setting the &#8220;DIT bit&#8221; to enable data-independent timing. However, this does not fix the problem for M1 or M2 processors.<\/p>\n<p>Apple has not yet officially announced its M4 line of processors; only time will tell whether GoFetch may affect these chips as well.<a name=\"exploited\"><\/a><\/p>\n<h3>Have attackers exploited GoFetch in the wild?<\/h3>\n<p>The researchers published their findings on March 21, 2024. As far as we know, attackers have not yet exploited GoFetch in any real-world attack scenarios since then. But in theory, threat actors could begin to exploit GoFetch in the wild, now that the flaw is public knowledge.<a name=\"worried\"><\/a><\/p>\n<h3>Should I be worried about GoFetch?<\/h3>\n<p>For now, users of Apple products with M1, M2, or M3 processors shouldn&#8217;t worry about GoFetch.<\/p>\n<p>If at some point Apple becomes aware of threat actors exploiting the flaw in the wild\u2014and especially if the public were also aware of this fact\u2014Apple would presumably attempt to mitigate GoFetch. Such a mitigation could hypothetically come in the form of an update to Lockdown Mode, to avoid performance penalties for everyday users who might be less likely to experience an attack exploiting GoFetch.<a name=\"malware\"><\/a><\/p>\n<h3>Could malware leverage GoFetch? How can I keep my Mac safe?<\/h3>\n<p>If there&#8217;s ever any Mac malware that exploits GoFetch, Intego will quickly add detection for it to keep our customers safe.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s current Mac operating system, macOS Sonoma.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We briefly discussed key points about GoFetch on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/vintage-obsolete-and-a-few-anniversaries-intego-mac-podcast-episode-338\/\">episode 338<\/a> of the Intego Mac Podcast. For a deeper dive, we recommend reading Dan Goodin&#8217;s <a href=\"https:\/\/arstechnica.com\/security\/2024\/03\/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips\/\" target=\"_blank\" rel=\"noopener\">coverage,<\/a> as well as <a href=\"https:\/\/gofetch.fail\/\" target=\"_blank\" rel=\"noopener\">the researchers&#8217; site<\/a>. You can also read the researchers&#8217; highly technical <a href=\"https:\/\/gofetch.fail\/files\/gofetch.pdf\" target=\"_blank\" rel=\"noopener\">white paper<\/a> (PDF).<\/p>\n<p><iframe style=\"width: 100%; max-width: 660px; overflow: hidden; border-radius: 10px;\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/episode-338-vintage-obsolete-and-a-few-anniversaries\/id1293834627?i=1000651405368\" height=\"175\" frameborder=\"0\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A serious flaw in Apple\u2019s M1, M2, and M3 chips could enable attackers to break the security of Macs (and perhaps iPads and Apple Vision Pro). Here is everything you need to know about how GoFetch might affect you.<\/p>\n","protected":false},"author":14,"featured_media":100176,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[4712,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A serious flaw in Apple\u2019s M1, M2, and M3 chips could enable attackers to break the security of Macs (and perhaps iPads and Apple Vision Pro). Here is everything you need to know about how GoFetch might affect you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Unpatchable&quot; flaw in Apple M1\/M2\/M3 chips: GoFetch is the new Spectre - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A serious flaw in Apple\u2019s M1, M2, and M3 chips could enable attackers to break the security of Macs (and perhaps iPads and Apple Vision Pro). Here is everything you need to know about how GoFetch might affect you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-05T16:58:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-13T00:54:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-400x260-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-400x260-v2.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-400x260-v2.jpg\",\"width\":400,\"height\":260,\"caption\":\"GoFetch logo Apple M1 M2 M3 series chip vulnerability flaw red wasteland background\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/\",\"name\":\"\\\"Unpatchable\\\" flaw in Apple M1\/M2\/M3 chips: GoFetch is the new Spectre - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#primaryimage\"},\"datePublished\":\"2024-04-05T16:58:11+00:00\",\"dateModified\":\"2024-07-13T00:54:22+00:00\",\"description\":\"A serious flaw in Apple\\u2019s M1, M2, and M3 chips could enable attackers to break the security of Macs (and perhaps iPads and Apple Vision Pro). Here is everything you need to know about how GoFetch might affect you.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Unpatchable&#8221; flaw in Apple M1\/M2\/M3 chips: GoFetch is the new Spectre\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"&#8220;Unpatchable&#8221; flaw in Apple M1\/M2\/M3 chips: GoFetch is the new Spectre\",\"datePublished\":\"2024-04-05T16:58:11+00:00\",\"dateModified\":\"2024-07-13T00:54:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#webpage\"},\"wordCount\":884,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-400x260-v2.jpg\",\"keywords\":[\"Speculative Execution\",\"Vulnerabilities\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A serious flaw in Apple\u2019s M1, M2, and M3 chips could enable attackers to break the security of Macs (and perhaps iPads and Apple Vision Pro). Here is everything you need to know about how GoFetch might affect you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/","og_locale":"en_US","og_type":"article","og_title":"\"Unpatchable\" flaw in Apple M1\/M2\/M3 chips: GoFetch is the new Spectre - The Mac Security Blog","og_description":"A serious flaw in Apple\u2019s M1, M2, and M3 chips could enable attackers to break the security of Macs (and perhaps iPads and Apple Vision Pro). Here is everything you need to know about how GoFetch might affect you.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-04-05T16:58:11+00:00","article_modified_time":"2024-07-13T00:54:22+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-400x260-v2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-400x260-v2.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-400x260-v2.jpg","width":400,"height":260,"caption":"GoFetch logo Apple M1 M2 M3 series chip vulnerability flaw red wasteland background"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/","name":"\"Unpatchable\" flaw in Apple M1\/M2\/M3 chips: GoFetch is the new Spectre - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#primaryimage"},"datePublished":"2024-04-05T16:58:11+00:00","dateModified":"2024-07-13T00:54:22+00:00","description":"A serious flaw in Apple\u2019s M1, M2, and M3 chips could enable attackers to break the security of Macs (and perhaps iPads and Apple Vision Pro). Here is everything you need to know about how GoFetch might affect you.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"&#8220;Unpatchable&#8221; flaw in Apple M1\/M2\/M3 chips: GoFetch is the new Spectre"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"&#8220;Unpatchable&#8221; flaw in Apple M1\/M2\/M3 chips: GoFetch is the new Spectre","datePublished":"2024-04-05T16:58:11+00:00","dateModified":"2024-07-13T00:54:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#webpage"},"wordCount":884,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-400x260-v2.jpg","keywords":["Speculative Execution","Vulnerabilities"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/unpatchable-flaw-in-apple-m1-m2-m3-chips-gofetch-is-the-new-spectre\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/GoFetch-logo-Apple-M-series-chip-vulnerability-with-red-wasteland-background-400x260-v2.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-q3D","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100169"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=100169"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100169\/revisions"}],"predecessor-version":[{"id":100312,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100169\/revisions\/100312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/100176"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=100169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=100169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=100169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}