First public macOS kernel memory corruption exploit on Apple M5

· security systems · Source ↗

TLDR

  • Calif security researchers, aided by AI model Mythos Preview, built a working macOS kernel privilege escalation exploit on M5 silicon bypassing MIE in five days.

Key Takeaways

  • MIE (Memory Integrity Enforcement), Apple’s hardware-assisted MTE-based mitigation introduced with M5/A19, was bypassed via a data-only kernel local privilege escalation chain.
  • The exploit chain targets macOS 26.4.1 (25E253), starts from an unprivileged local user using only normal syscalls, and ends with a root shell on bare-metal M5.
  • Two vulnerabilities were found April 25-27 by Bruce Dang and Dion Blazakis; Josh Maine built tooling; working exploit landed May 1st – five days total.
  • The attack is data-only, meaning it avoids triggering MTE tag checks rather than defeating the hardware mechanism directly.
  • Full 55-page technical report will be released after Apple ships a fix; Apple was notified in person at Apple Park.

Hacker News Comment Review

  • Discussion centers on the data-only attack angle: by avoiding pointer tag violations, the exploit sidesteps MTE enforcement entirely rather than breaking the hardware primitive.
  • Commenters question why Apple’s fbounds checking, applied aggressively elsewhere, was absent here – suggesting MIE plus fbounds together would close this class of attack.

Original | Discuss on HN