Aquinus
Resident Wat-man
- Joined
- Jan 28, 2012
- Messages
- 13,171 (2.79/day)
- Location
- Concord, NH, USA
System Name | Apollo |
---|---|
Processor | Intel Core i9 9880H |
Motherboard | Some proprietary Apple thing. |
Memory | 64GB DDR4-2667 |
Video Card(s) | AMD Radeon Pro 5600M, 8GB HBM2 |
Storage | 1TB Apple NVMe, 4TB External |
Display(s) | Laptop @ 3072x1920 + 2x LG 5k Ultrafine TB3 displays |
Case | MacBook Pro (16", 2019) |
Audio Device(s) | AirPods Pro, Sennheiser HD 380s w/ FIIO Alpen 2, or Logitech 2.1 Speakers |
Power Supply | 96w Power Adapter |
Mouse | Logitech MX Master 3 |
Keyboard | Logitech G915, GL Clicky |
Software | MacOS 12.1 |
Do you actually proofread this stuff before posting it?claimeing
That's not a freaking vulnerability. If somebody already has root access, you're already screwed. The likelihood of this actually being utilized in the real world is so freaking small. I'm so tired of these AI driven exploits that can't actually be exploited in a real world situation.A privileged attacker (Administrator or root) is required to access APIC MMIO.
It's almost like you can't protect against stupid.Like most of these cleverly-named vulnerabilities, this one is mostly a non-issue. The only people who need to be worried are those who are running multiple clients on a single server (i.e. cloud) and guess what... if they're in any way competent, they aren't running anything as admin/root. If they're not competent, then they deserve whatever pain they get and they should fix their setup.