Monday, May 18, 2026

Memory Integrity Enforcement Exploit

Khanh:

Early this week, we had a meeting at Apple Park in Cupertino. While there, we also shared with Apple our latest vulnerability research report: the first public macOS kernel memory corruption exploit on M5 silicon, surviving MIE. It was laser printed, in honor of our hacker friends.

[…]

The exploit is a data-only kernel local privilege escalation chain targeting macOS 26.4.1 (25E253). It starts from an unprivileged local user, uses only normal system calls, and ends with a root shell. The implementation path involves two vulnerabilities and several techniques, targeting bare-metal M5 hardware with kernel MIE enabled.

[…]

We didn’t build the chain alone. Mythos Preview helped identify the bugs and assisted throughout exploit development.

Previously:

Comments RSS · Twitter · Mastodon

Leave a Comment