← Back to Blogs
HN Story

Bypassing the Unbypassable: The First Public M5 Kernel Exploit and the Rise of AI-Driven Security

May 16, 2026

Bypassing the Unbypassable: The First Public M5 Kernel Exploit and the Rise of AI-Driven Security

The security community has long viewed Apple's hardware-software integration as the gold standard for consumer device protection. With the introduction of the M5 chip, Apple doubled down on this philosophy by implementing Memory Integrity Enforcement (MIE), a hardware-assisted memory safety system based on ARM's Memory Tagging Extension (MTE). Designed to render memory corruption exploits—the most common class of critical vulnerabilities—nearly impossible, MIE was touted as a disruption to almost every known public exploit chain.

However, a recent report from the research team at Calif has sent a ripple through the industry: they have successfully developed the first public macOS kernel memory corruption exploit on M5 silicon that survives MIE. This achievement not only challenges the perceived invincibility of MIE but also highlights a paradigm shift in how vulnerabilities are discovered and weaponized through the synergy of human experts and artificial intelligence.

The Anatomy of the Exploit

While the full 55-page technical report is being withheld until Apple patches the vulnerabilities, the researchers provided a high-level overview of the attack vector. The exploit is described as a data-only kernel local privilege escalation chain targeting macOS 26.4.1 (build 25E253).

Key characteristics of the attack include:

  • Entry Point: It begins with an unprivileged local user.
  • Methodology: The chain utilizes only standard system calls, avoiding the need for exotic or undocumented entry points.
  • Outcome: The process culminates in a root shell, granting the attacker full administrative control over the system.
  • Hardware Target: The exploit specifically targets bare-metal M5 hardware with kernel MIE enabled.

The Role of AI: Enter Mythos Preview

Perhaps the most provocative aspect of this discovery is the speed of development. The team moved from initial bug discovery on April 25th to a working exploit by May 1st—a window of just one week. This acceleration was made possible by Mythos Preview, an AI system capable of generalizing attack patterns across classes of problems.

According to the Calif team, Mythos was instrumental in quickly identifying the bugs because they belonged to known vulnerability classes. However, the researchers emphasize that AI alone was not enough. Bypassing a state-of-the-art mitigation like MIE required the nuanced intuition and expertise of human researchers to bridge the gap between a discovered bug and a viable exploit.

This "centaur" approach—pairing frontier AI models with elite security researchers—suggests that the cost of discovering critical vulnerabilities is dropping precipitously, even when facing multi-billion dollar hardware defenses.

Industry Reaction and Skepticism

As with any high-profile claim, the announcement has met with a mixture of awe and skepticism within the technical community. On platforms like Hacker News, discussions have centered on several key points:

The "Hype" Factor

Some critics argue that the announcement leans heavily into marketing for Mythos Preview.

"Another breathless marketing hype for Mythos. The curl report was much more sober," noted one commenter, suggesting that the narrative may be designed to inflate the perceived capabilities of the AI tool.

Technical Transparency

Because the full report is pending a patch from Apple, some researchers have expressed frustration over the lack of verifiable data.

"This is incredibly light in details, no verifiable claim as far as I can tell," noted @fguerraz, highlighting the tension between responsible disclosure and the need for peer verification in the security community.

The Future of Memory Safety

The exploit has also reignited debates about the role of memory-safe languages. Some observers questioned why Apple continues to rely on mitigations for C-based kernels rather than fully transitioning to memory-safe languages like Swift for core kernel components.

Conclusion: The "AI Bugmageddon"

The Calif team describes their work as a glimpse into a future they call the "AI bugmageddon." If a small team can bypass the world's most advanced hardware memory protections in a week using AI, the traditional arms race between defenders and attackers has fundamentally changed.

Apple's MIE was built for a world of human-led research. In a world where AI can autonomously scan for bug classes and humans can rapidly refine the exploit path, the window of safety provided by hardware mitigations may be shorter than previously imagined. The industry now waits for the full technical disclosure to understand exactly how MIE was evaded and what it means for the future of macOS and iOS security.

References

HN Stories