Exploit Uncovered for Apple’s M5 Chip After AI-Aided Breakthrough
Article / iPhone

Exploit Uncovered for Apple’s M5 Chip After AI-Aided Breakthrough

A cybersecurity startup has successfully exploited Apple's M5 chip memory protections in under a week, highlighting AI's growing influence on cyber threats.

A significant breakthrough in cybersecurity emerged this week as a Palo Alto-based startup, Calif, successfully developed a working exploit against Apple’s M5 chip memory protections. Achieved in less than a week using Anthropic's Claude Mythos AI model, this exploit raises important questions about the implications of artificial intelligence in accelerating cyber threats.

The Exploit Timeline

Researchers at Calif discovered the vulnerabilities in a remarkably short timeframe. Bruce Dang, one of the lead researchers, identified the bugs on April 25. Dion Blazakis joined the effort two days later, and with Josh Maine developing the necessary tools, the team had a fully functioning exploit ready by May 1 — all within just six days. This rapid pace in exploit development is unprecedented and highlights the evolving challenges in cybersecurity.

Understanding Memory Integrity Enforcement

Apple introduced Memory Integrity Enforcement (MIE) as part of its M5 chipset to enhance memory safety by detecting and blocking potential memory corruption attacks. This technology is the result of nearly five years of development and significant financial investment from Apple. MIE was designed to thwart known exploit chains targeting modern iOS systems, including prominent kits like Coruna and Darksword. However, Calif's exploit stands out as the first public macOS kernel memory corruption exploit to bypass these new protections.

The Role of AI in Cybersecurity

Calif credited the Claude Mythos Preview model as a key factor in their swift success. The AI model's capability to quickly identify vulnerabilities within recognized exploit categories allowed the team to streamline their efforts. According to the firm, "Mythos Preview is powerful: once it has learned how to attack a class of problems, it generalises to nearly any problem in that class." This ability is particularly concerning, as it indicates that AI can significantly enhance both the speed and efficiency of cyber threats.

Despite the advantages AI offers, researchers acknowledged that substantial human expertise was still necessary to navigate the complexities of bypassing the MIE system. This situation illustrates a dual-edged sword in cybersecurity: while AI can bolster offensive capabilities, it also requires skilled human oversight.

Industry Reactions and Concerns

The release of the Mythos preview model in April, after extensive internal testing, has generated significant interest within the cybersecurity community. Access to the model is restricted under Anthropic's Project Glasswing initiative, which is limited to select technology companies, banks, and researchers. This controlled release highlights the potential risks associated with AI's capabilities in identifying and exploiting software vulnerabilities.

In a separate internal evaluation, Mozilla noted that Mythos identified 271 vulnerabilities in Firefox, further showcasing the model's effectiveness. The rapid advancement of AI-driven offensive capabilities raises considerable concerns for cybersecurity professionals and organizations.

Calif took the unusual step of sharing its findings with Apple in person, opting for direct communication over the traditional submission process. This choice reflects the severity of the exploit and the urgency with which the startup sought to ensure that Apple could address the vulnerabilities before they could be widely exploited.

As the industry navigates the implications of AI in cybersecurity, the swift development of exploits like this one serves as a stark reminder of the challenges that lie ahead. With AI capabilities evolving quickly, both offensive and defensive strategies must adapt rapidly to keep pace with the changing threat landscape.

Quick answers

How does this exploit compare to previous vulnerabilities?

This exploit is the first known public macOS kernel memory corruption exploit that has successfully bypassed Apple's new MIE protections.

When was the exploit developed?

The exploit was developed between April 25 and May 1, 2026, taking less than a week to complete.

What is Memory Integrity Enforcement?

Memory Integrity Enforcement (MIE) is a security feature in Apple's M5 chipset designed to detect and block memory corruption attacks.

About the author

MJI Desk

MJI Desk covers consumer tech for MJI News.