Security research firm Calif has disclosed a significant vulnerability in Apple's M5 chip, achieving full privilege escalation from local user to root shell on macOS devices in just five days. The attack, detailed in a 55-page report, exploited two zero-day kernel vulnerabilities and a side-channel tag collision technique to bypass Apple's MIE hardware memory safety mechanism. This marks the first public exploitation of macOS kernel memory corruption targeting the M5 chip's MIE.
The research was accelerated by the AI tool Claude Mythos Preview, which played a crucial role in identifying vulnerabilities. Following the disclosure, Apple has patched the vulnerabilities in macOS 26.5. The breakthrough highlights the growing role of AI in cybersecurity, with both defenders and attackers leveraging AI to accelerate vulnerability discovery and exploitation.
AI-Driven Exploit Bypasses Apple M5's Memory Security in Five Days
면책 조항: Phemex 뉴스에서 제공하는 콘텐츠는 정보 제공 목적으로만 제공됩니다. 제3자 기사에서 출처를 얻은 정보의 품질, 정확성 또는 완전성을 보장하지 않습니다.이 페이지의 콘텐츠는 재무 또는 투자 조언이 아닙니다.투자 결정을 내리기 전에 반드시 스스로 조사하고 자격을 갖춘 재무 전문가와 상담하시기 바랍니다.
