GoFetch
From Wikipedia, the free encyclopedia
Date discoveredprivately disclosed to Apple on 5 December 2023,[1] public announcement on 20 March 2024[1]
DiscovererBoru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin
Affected hardwareApple silicon CPUs (M1, M2, M3 and A14)
Websitehttps://gofetch.fail/
The GoFetch project logo | |
| Date discovered | privately disclosed to Apple on 5 December 2023,[1] public announcement on 20 March 2024[1] |
|---|---|
| Discoverer | Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin |
| Affected hardware | Apple silicon CPUs (M1, M2, M3 and A14) |
| Website | https://gofetch.fail/ |
GoFetch is a family of cryptographic attacks on some Apple silicon chips that exploits the CPU's on-chip data memory-dependent prefetcher (DMP) to investigate the contents of memory.[2][1]