Two models of iPhone can be hacked, the charging point itself became a gift for hackers
Thomas Roth discovered a way to hack the ACE3 controller through reverse engineering, RF side-channel analysis, and electromagnetic fault injection. Through this process, he was able to reprogram the controller, inject code, and bypass all security checks.
Do you know your iPhone can be hacked if you also have an iPhone and it has a Type-C charging port? What if your iPhone's data goes into the wrong hands just by plugging it into an unknown USB port? The same scary situation is associated with the new USB-C ports and ACE3 USB-C controller introduced with the iPhone 15 and iPhone 16 series. Security researcher Thomas Roth has found a flaw in this charging chip, which could open the door for hackers to hack your phone.
Using reverse engineering, RF side-channel analysis, and electromagnetic fault injection, Thomas Roth discovered it was possible to hack the ACE3 controller, which allowed him to reprogram the controller, inject code, and bypass all security checks.
That means, in case of exploitation by hackers, they gain access to your iPhone and the data in it, though for this they will need physical access, i.e., accessing your phone through a USB-C cable, which is very difficult.