Hacking Apple's USB-C Port Controller
This talk demonstrates techniques for interacting with and exploiting Apple's proprietary USB-C port controller (ACE) to gain low-level access to Apple Silicon devices. The researcher details how to use Vendor Defined Messages (VDM) and custom hardware to achieve serial console access and eventually arbitrary memory read/write capabilities. The presentation highlights the use of fault injection, specifically Electro-Magnetic Fault Injection (EMFI), to bypass security mechanisms and dump firmware from locked production devices. The researcher also releases custom tools for interacting with the ACE controller and performing fault injection.
Breaking Apple Silicon: Exploiting the ACE Port Controller
TLDR: Apple’s proprietary USB-C port controller, known as ACE, is a critical, undocumented attack surface on modern Apple Silicon devices. By leveraging Vendor Defined Messages (VDM) and custom hardware, researchers can achieve serial console access and arbitrary memory read/write capabilities. This research demonstrates that even without secure boot on these controllers, physical access allows for firmware extraction and persistence, fundamentally undermining the device's hardware-level security.
Hardware security research often hits a wall when it encounters proprietary silicon. We assume the black box is secure because we cannot see inside it. However, the recent work on Apple’s USB-C port controller, the ACE chip, proves that "undocumented" is just another word for "untested." By reverse-engineering the communication protocol between the SoC and the port controller, researchers have effectively turned a charging port into a gateway for low-level system access.
The Anatomy of the ACE Controller
The ACE controller is a tiny microcontroller sitting between the USB-C port and the main System on Chip (SoC). Its primary job is handling USB Power Delivery (USB-PD) negotiation. Because it is a microcontroller, it runs its own firmware. The research reveals that this firmware is not just a simple power manager; it contains a rich set of commands accessible via Vendor Defined Messages (VDM).
These messages allow an attacker to reconfigure the pins on the USB-C connector. Specifically, you can remap the Sideband Use (SBU) pins to act as a serial console. Once you have a serial console, you are no longer just a user; you are a researcher with a direct line to the hardware. The Asahi Linux team has done extensive work documenting these protocols, providing the foundation for anyone looking to probe these interfaces.
From Serial Console to Arbitrary Memory Access
Getting a serial console is the first step, but the real prize is arbitrary memory read/write. The ACE controller communicates with the SoC via the Apple Host Port Microcontroller (HPM) bus. By sending specific four-byte (FourCC) commands, you can interact with the controller's registers.
The vulnerability here is that the ACE controller lacks a robust secure boot mechanism. While updates are signed with RSA-3072, the signature is only verified during the update process. Once the firmware is running, there is no runtime integrity check. If you can find a way to execute code, you can patch the firmware in memory.
To achieve this, researchers used Electro-Magnetic Fault Injection (EMFI). By placing a coil over the chip and pulsing it with high voltage at the exact moment the firmware is being loaded from the external SPI flash, you can induce a fault. This fault can skip instructions or flip bits in registers, allowing you to bypass signature checks or force the chip into a debug state.
# Example of using acetool to interact with the ACE controller
sudo ./acetool IOService:/AppleT8103IO/i2c@35010000/Apple5L8940IX2Controller/AppleHPMBusController/hpm1/AppleHPMARM
The Reality of Hardware Hacking
If you are performing a physical security assessment, this is a game-changer. You no longer need to rely on software-based exploits that might be patched in the next macOS update. You are attacking the silicon itself. The tools required, such as the ChipSHOUTER for fault injection and the HackRF One for side-channel analysis, are becoming standard kit for hardware researchers.
The impact of this cannot be overstated. If an attacker gains persistence on the ACE controller, they can intercept data, manipulate power states, or potentially act as a persistent implant that survives a full system wipe. Because the ACE controller is separate from the main CPU, it operates in a blind spot for most traditional endpoint detection and response (EDR) solutions.
Defensive Realities
Defending against physical fault injection is notoriously difficult. It requires hardware-level mitigations like active shields, internal voltage regulation, and hardened logic that can detect clock or voltage glitches. For the average enterprise, the defense is physical security. If an attacker has the time and the equipment to perform EMFI on a device, the game is already lost.
However, for developers and security architects, the lesson is clear: do not trust the "security" of proprietary hardware components. If a chip handles sensitive data or controls system state, it must be treated as a potential entry point. We need to move toward architectures where even if a peripheral controller is compromised, the main SoC remains isolated and protected.
The research into the ACE controller is a reminder that the most effective attacks often happen at the boundaries where different systems meet. Whether it is the interface between a USB-C port and an SoC or the gap between software and hardware, these are the places where the most interesting bugs live. Keep your eyes on the hardware, keep your soldering iron hot, and never assume a chip is as secure as the vendor claims.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference

Breaking Secure Web Gateways for Fun and Profit

Listen to the Whispers: Web Timing Attacks That Actually Work

Abusing Windows Hello Without a Severed Hand
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Anyone Can Hack IoT: A Beginner's Guide to Hacking Your First IoT Device

