Apple’s proprietary USB-C controller has officially been hacked – what you need to know
Security researchers not hackers managed to pull of this feat
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Daily (Mon-Sun)
Tom's Guide Daily
Sign up to get the latest updates on all of your favorite content! From cutting-edge tech news and the hottest streaming buzz to unbeatable deals on the best products and in-depth reviews, we’ve got you covered.
Weekly on Thursday
Tom's AI Guide
Be AI savvy with your weekly newsletter summing up all the biggest AI news you need to know. Plus, analysis from our AI editor and tips on how to use the latest AI tools!
Weekly on Friday
Tom's iGuide
Unlock the vast world of Apple news straight to your inbox. With coverage on everything from exciting product launches to essential software updates, this is your go-to source for the latest updates on all the best Apple content.
Weekly on Monday
Tom's Streaming Guide
Our weekly newsletter is expertly crafted to immerse you in the world of streaming. Stay updated on the latest releases and our top recommendations across your favorite streaming platforms.
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
In a solemn reminder that no system is 100% safe and unhackable, it was announced over the weekend that security researchers have managed to successfully hack Apple’s proprietary ACE3 USB-C controller, which handles both power delivery and works as a sophisticated microcontroller with access to internal systems.
Introduced with iPhone 15 and iPhone 15 Pro, the ACE3 USB-C controller is much more than a standard USB-C chip; it also runs a complete USB stack and connects to internal devices buses including the Joint Test Action Group (JTAG) application processor and System Power Management Interface (SPMI) bus. The ACE3 features personalized firmware updates, disabled debug interfaces and cryptographically validated external flash memory.
All these capabilities make the chip both an integral part of Apple’s ecosystem and a very attractive target for both security researchers as well as for cybercriminals. However, the ACE3 USB-C controller, which is manufactured by Texas Instruments for Apple, is harder to exploit than its predecessor, the ACE2. The security researchers had to use more advanced hardware techniques to crack ACE3, while ACE2 was easier to exploit with software vulnerabilities.
In order to hack the ACE3 USB-C controller, researchers did extensive analysis on the ACE2 version to understand the architecture and vulnerabilities of that model. After using MacBook hardware exploits and custom macOS kernel modules, they managed to backdoor ACE2. In order to handle the more robust security enhancements of ACE3, the security team had to employ a combination of reverse engineering, RF side-channel analysis and an electromagnetic fault injection.
This combination allowed them to execute code using the chip, they were then able to measure the electromagnetic signals during the startup process in order to identify the moment firmware validation occurred. Using electromagnetic fault injection at this critical juncture gave them the ability to bypass validation checks and boot a modified firmware patch into the CPU.
A breakthrough of this nature has obvious implications for device security, given ACE3’s integration with the device’s internal systems. The security flaw achieved by researchers could lead to untethered jailbreaks, persistent firmware implants capable of compromising the main operating system or unauthorized access by malicious actors.
These advanced physical attacks, like fault injection and side-channel analysis, are becoming the preferred methods to exploit highly secure systems especially as companies like Apple implement increasingly effective security measures that make software based attacks less successful. Given this development into hacking the ACE3 USB-C controller, it is likely that Apple will respond by implementing additional countermeasures such as improved shielding or more robust fault detection mechanisms.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
More from Tom's Guide
- iPhone users under threat from new ‘reset password’ attack
- New macOS malware uses Apple's own code to quietly steal credentials and data
- Apple IDs under threat from new phishing attack spread through texts — don’t fall for this

Amber Bouman is the senior security editor at Tom's Guide where she writes about antivirus software, home security, identity theft and more. She has long had an interest in personal security, both online and off, and also has an appreciation for martial arts and edged weapons. With over two decades of experience working in tech journalism, Amber has written for a number of publications including PC World, Maximum PC, Tech Hive, and Engadget covering everything from smartphones to smart breast pumps.
