Security research firm Calif has disclosed a significant vulnerability in Apple's M5 chip, achieving full privilege escalation from local user to root shell on macOS devices in just five days. The attack, detailed in a 55-page report, exploited two zero-day kernel vulnerabilities and a side-channel tag collision technique to bypass Apple's MIE hardware memory safety mechanism. This marks the first public exploitation of macOS kernel memory corruption targeting the M5 chip's MIE.
The research was accelerated by the AI tool Claude Mythos Preview, which played a crucial role in identifying vulnerabilities. Following the disclosure, Apple has patched the vulnerabilities in macOS 26.5. The breakthrough highlights the growing role of AI in cybersecurity, with both defenders and attackers leveraging AI to accelerate vulnerability discovery and exploitation.
AI-Driven Exploit Bypasses Apple M5's Memory Security in Five Days
免責事項: Phemexニュースで提供されるコンテンツは、あくまで情報提供を目的としたものであり、第三者の記事から取得した情報の正確性・完全性・信頼性について保証するものではありません。本コンテンツは金融または投資の助言を目的としたものではなく、投資に関する最終判断はご自身での調査と、信頼できる専門家への相談を踏まえて行ってください。
