For Apple's sake and the sake of the product, shout outs for the person behind finding and talking about this severe security hole. How could have Apple missed this? Then again, OS X is now incredibly secure, mistakes happen.
But this needs to be addressed ASAP, or I know I'd honestly never buy an Apple laptop with this vulnerability - that's ofcourse to say, I wouldn't spend my well earned money on any other laptop if it's not a Mac, but with an issue like this, I would hold off until this is alleviated.![]()
The severity remains to be seen. It does not provide an attack vector into the machine, it is merely something that can be exploited on an already compromised machine. Yes you can physically damage the machine, but you can physically damage a compromised machine in a lot of ways.
I am not sure if Miller's tool is the answer, i believe by randomizing the password you may prevent Apple from updating the firmware on the battery. (I suppose you could change it back to apply an update).
To me it looks like this is all Miller could find, so he ran with it for some headlines. Do other machines even have a security mechanism on the battery firmware? It is most likely to prevent end users from damaging their machines then it is a security feature. The linked article does not even pretend to assert this could be used to compromise a machine in any way. They do say if you found an unknown vulnerability in part of an already compromised machine, you could possibly use this to re-attack the machine. That logic can be applied to every component in the system that has firmware. There is no reason the same thing could not be done from the NIC or the video card.
Last edited: