First Public macOS M5 Kernel Exploit Bypasses Apple's Memory Protection in Five Days

Small teams with AI can now do what used to require massive resources
The exploit demonstrates a shift in security economics where AI-augmented researchers achieved in five days what Apple spent five years engineering against.

In the first days of May 2026, a three-person research team in California accomplished what Apple had spent five years and billions of dollars trying to make impossible — a working exploit against the M5 chip's hardware memory protection. The achievement is less a story about one company's vulnerability than about a broader shift in the economics of security: AI-augmented small teams can now compress years of defensive investment into days of offensive discovery. The wall was not breached by a nation-state or a well-funded adversary, but by a pairing of human expertise and machine pattern recognition that is only beginning to mature.

  • A five-day exploit chain against Apple's flagship hardware security feature has collapsed the assumed cost asymmetry between offense and defense in kernel security.
  • The attack requires only a local unprivileged account and standard system calls, delivering full root access on M5 hardware even while Memory Integrity Enforcement is actively running.
  • Anthropic's Mythos Preview AI model accelerated vulnerability discovery by generalizing attack patterns across entire flaw classes — a capability that previously demanded large, well-resourced teams.
  • Rather than entering Apple's backlogged bug bounty queue, the researchers hand-delivered a 55-page report to Apple Park, keeping technical details unpublished until a patch is ready.
  • Apple is working on a fix, but until it arrives, every macOS 26.4.1 system on M5 hardware carries a theoretical local privilege escalation risk from an exploit the public cannot yet see.

On May 1st, a three-person team of researchers — Bruce Dang, Dion Blazakis, and Josh Maine — demonstrated a complete exploit chain bypassing Apple's Memory Integrity Enforcement on M5 hardware running macOS 26.4.1. The underlying vulnerabilities had been discovered just days earlier, on April 25th. Within a week, the team had turned those findings into a working attack that starts from an unprivileged local account, uses only standard system calls, and delivers a full root shell — all while MIE is active.

Memory Integrity Enforcement is Apple's most ambitious hardware security initiative to date, built on ARM's Memory Tagging Extension architecture and introduced as the defining security feature of the M5 and A19 chips. Apple's own research credited it with disrupting every known public exploit chain against modern iOS. It was designed specifically to raise the cost of kernel memory corruption attacks to a prohibitive level.

What compressed that cost so dramatically was Anthropic's Mythos Preview AI model. The system identified both vulnerabilities and assisted throughout exploit development, generalizing attack patterns across known vulnerability classes once it understood the problem space. The researchers are clear that autonomously bypassing MIE still required deep human expertise — the breakthrough came from the combination, not from AI alone.

Rather than routing their findings through Apple's bug bounty program — which backs up significantly around major security conferences — the team walked a printed 55-page report directly into Apple Park in Cupertino. Full technical details will remain withheld until Apple issues a patch.

The five-day timeline against a five-year, billion-dollar defense is already being cited as a benchmark for what AI-augmented offensive research can achieve. One researcher frames it as an early signal of an 'AI bugmageddon' era, where small teams can accomplish what once required large, well-funded organizations. Apple is reportedly working on a fix. Until it arrives, M5 systems on macOS 26.4.1 remain at theoretical risk.

On May 1st, a small team of researchers in California had something Apple spent five years and billions of dollars trying to prevent: a working exploit that bypassed the M5 chip's Memory Integrity Enforcement system, the hardware-level memory protection that was supposed to be the company's answer to kernel attacks.

Bruce Dang, Dion Blazakis, and Josh Maine discovered the underlying vulnerabilities on April 25th. Two days later they joined forces. By May 1st, they had a complete exploit chain running on macOS 26.4.1 on bare-metal M5 hardware. The attack starts from an unprivileged local user account, uses only standard system calls, and delivers a full root shell—all while Apple's Memory Integrity Enforcement, or MIE, is active and supposed to be protecting the system.

Memory Integrity Enforcement is built on ARM's Memory Tagging Extension architecture. Apple introduced it as the flagship security feature of the M5 and A19 chips, a hardware-assisted system designed specifically to disrupt kernel memory corruption exploits. According to Apple's own research, MIE disrupts every known public exploit chain against modern iOS, including the leaked Coruna and Darksword exploit kits. It was meant to be the wall that couldn't be breached.

The researchers didn't follow the usual path. Instead of submitting their findings through Apple's bug bounty program—which has grown crowded, especially during major security conferences—they walked a 55-page printed report directly into Apple Park in Cupertino. They chose this deliberate approach to avoid the submission queues that back up during events like Pwn2Own. Full technical details will remain unpublished until Apple releases a patch.

What made the five-day timeline possible was Anthropic's Mythos Preview, a powerful AI model that identified the two vulnerabilities and assisted throughout the exploit development process. Calif describes the model as capable of generalizing attack patterns across entire vulnerability classes once it learns a problem type. The bugs fell within known categories of flaws, which accelerated discovery, but autonomously bypassing MIE still required significant human expertise. The breakthrough came from a pairing: AI surfacing the vulnerabilities, humans understanding how to weaponize them.

Memory corruption remains the most prevalent vulnerability class across all modern platforms. Security mitigations like MIE are designed to raise the cost of exploitation, not make it impossible. But the five-day timeline against a protection that took five years to build is being cited as a significant benchmark for what AI-assisted offensive security research can accomplish. Calif frames the exploit as a preview of what he calls the "AI bugmageddon" era—a period where small, AI-augmented security teams can achieve what previously required large, well-funded organizations with dedicated resources.

Apple was built in a world before Mythos Preview existed. This exploit signals that the calculus of hardware security is already shifting. As AI models grow more capable at surfacing unknown bugs within known vulnerability classes, even best-in-class hardware mitigations face a narrowing window of effectiveness. Apple is reportedly working on a fix. Until a patch is released, systems running macOS 26.4.1 on M5 hardware remain at theoretical risk from local privilege escalation via this unpublished exploit chain.

The model is capable of generalizing attack patterns across entire vulnerability classes once it has learned a problem type
— Calif, describing Anthropic's Mythos Preview
Apple was built in a world before Mythos Preview; this exploit signals that the calculus of hardware security is already beginning to shift
— Security analysis in the research
A Conversa do Hearth Outra perspectiva sobre a história
Inventor

Why did they walk the report into Apple Park instead of using the normal bug bounty channel?

Model

The standard submission queues get overwhelmed, especially around major security events. They wanted their work to be taken seriously and patched quickly, not lost in the backlog.

Inventor

So the AI model did the actual hacking?

Model

No. The AI found the vulnerabilities and helped reason through attack patterns. But turning that into a working exploit against a system designed to stop exactly this kind of attack—that still required human expertise and intuition.

Inventor

Five days versus five years. That's the headline, right?

Model

It's the benchmark, yes. But what matters more is what it signals: small teams with AI assistance can now do what used to require massive resources and institutional knowledge.

Inventor

Is this exploit actually dangerous right now?

Model

Only theoretically, because the details are unpublished. But anyone running macOS 26.4.1 on M5 hardware is vulnerable until Apple patches it. The real danger is what comes next—other teams will see this and start looking for similar patterns.

Inventor

Did Apple's five-year investment fail?

Model

It raised the cost of exploitation significantly. But the researchers proved the cost isn't prohibitive anymore, especially when AI is in the equation. That changes how we think about hardware security timelines.

Fale Conosco FAQ