Public Exposure of macOS Kernel Exploit on Apple M5
Cybersecurity researchers have publicly exploited Apple’s M5 chip using a macOS kernel memory corruption attack that evades protective measures. The exploit targets macOS version 26.4.1 on native M5 hardware, gaining full root access from a standard local user account, even with Memory Integrity Enforcement (MIE) active.
Two significant vulnerabilities were identified on April 25, and within five days, a functioning exploit was developed. The researchers delivered a 55-page report to Apple Park to expedite communication, bypassing typical submission processes associated with events like Pwn2Own. Technical details will be disclosed after Apple releases a patch.
MIE enhances memory safety with ARM’s Memory Tagging Extension (MTE) technology, intended to prevent kernel memory corruption exploits. Apple’s work asserts that MIE obstructs nearly all known exploit chains related to modern iOS, including notable kits.
A sophisticated AI tool played a vital role in identifying the vulnerabilities and aiding the exploit’s development. The rapid identification of these bugs highlights the synergy between human expertise and artificial intelligence, underscoring the challenges in bypassing MIE.
The five-day timeline for the exploit contrasts with the five years taken by Apple to develop MIE, marking a milestone for AI-driven security research. Memory corruption vulnerabilities remain a top concern for modern operating systems, as protections like MIE enhance security but do not eliminate exploitation risks.
This research emphasizes the need for continual evolution in security measures as AI models increasingly uncover vulnerabilities. It suggests a potential shift in the cybersecurity landscape, where smaller teams can execute complex exploits previously reserved for larger organizations. Apple is reportedly working on a fix for the identified vulnerabilities to mitigate risks for macOS 26.4.1 users on M5 hardware.
Key Takeaways
- Researchers effectively used AI to identify vulnerabilities in Apple’s M5 hardware.
- The exploit grants root access under normal user permissions, bypassing MIE.
- Directly delivering the report to Apple expedited communication.
- MIE is a robust but bypassable memory safety measure.
- The rapid exploit development timeline highlights evolving cybersecurity influenced by AI advancements.
- Memory corruption vulnerabilities remain critical concerns for iOS and macOS.
- This case underscores the need for continuous evolution in security measures as threats become more sophisticated.
