
The group in the back of the primary public macOS kernel reminiscence corruption exploit on M5 silicon has shared contemporary main points on how Mythos Preview helped bypass a five-year Apple safety effort in 5 days.
A bit of of technical background
Remaining 12 months, Apple presented Reminiscence Integrity Enforcement (MIE), a hardware-assisted reminiscence protection device designed to make reminiscence corruption exploits a lot tougher to execute.
As Apple defined, MIE is mainly constructed on Arm’s Reminiscence Tagging Extension (MTE), which is a 2019 specification that works “as a device for {hardware} to assist in finding reminiscence corruption insects.”
Right here’s Apple:
MTE is, at its core, a reminiscence tagging and tag-checking device, the place each and every reminiscence allocation is tagged with a secret; the {hardware} promises that later requests to get entry to reminiscence are granted provided that the request incorporates the proper secret. If the secrets and techniques don’t fit, the app crashes, and the development is logged. This permits builders to spot reminiscence corruption insects instantly as they happen.
The issue is that Apple discovered that MTE wasn’t powerful sufficient below positive instances, so it evolved MIE and constructed it “into Apple {hardware} and instrument in all fashions of iPhone 17 and iPhone Air.”
To sum up, MIE is Apple’s hardware-assisted reminiscence protection device. It’s constructed on Arm’s MTE specification and makes use of the chip itself to assist come across and block positive reminiscence corruption assaults prior to they are able to be exploited.
You’ll be able to be told extra about MIE right here.
Input, the Calif group
Previous as of late, The Wall Side road Magazine reported on the truth that safety researchers at Calif had used Anthropic’s Mythos Preview fashion to show a brand new macOS safety vulnerability via linking in combination “two insects and a handful of tactics to deprave the Mac’s reminiscence after which acquire get entry to to portions of the software that are meant to be inaccessible.”
Now, the group in the back of the exploit has shared a couple of further main points on how they did it, together with a 20-second video of the kernel reminiscence corruption exploit in motion.
Within the publish, they word that whilst Apple has centered maximum of its MIE efforts on iOS, the corporate has not too long ago introduced it to MacBooks as neatly with the M5 chip.
Right here’s Calif:
Apple spent 5 years construction [MIE]. Most certainly billions of bucks too. In keeping with their analysis, MIE disrupts each and every public exploit chain in opposition to fashionable iOS, together with the not too long ago leaked Coruna and Darksword exploit kits.
Then, they touch upon how they broke MIE at the M5 in simply 5 days:
Our macOS assault trail was once in truth an unintentional discovery. Bruce Dang discovered the insects on April twenty fifth. Dion Blazakis joined Calif on April twenty seventh. Josh Maine constructed the tooling, and via Might 1st we had a running exploit.
The exploit is a data-only kernel native privilege escalation chain focused on macOS 26.4.1 (25E253). It begins from an unprivileged native consumer, makes use of solely standard device calls, and ends with a root shell. The implementation trail comes to two vulnerabilities and a number of other tactics, focused on bare-metal M5 {hardware} with kernel MIE enabled.
They give an explanation for they have got a 55-page technical document at the hack, however they gained’t unlock it till Apple ships a repair for the exploit.
However they do word in large phrases that Anthropic’s Mythos Preview fashion helped them determine the insects and assisted them all the way through all the collaborative exploit building procedure:
Mythos Preview is strong: as soon as it has discovered assault a category of issues, it generalizes to just about any downside in that category. Mythos came upon the insects temporarily as a result of they belong to recognized computer virus categories. However MIE is a brand new best-in-class mitigation, so autonomously bypassing it may be tough. That is the place human experience is available in.
A part of our motivation was once to check what’s imaginable when the most productive fashions are paired with mavens. Touchdown a kernel reminiscence corruption exploit in opposition to the most productive protections in per week is noteworthy, and says one thing robust about this pairing.
Within the publish, additionally they point out that this discovery earned them a seek advice from to Apple Park, the place they shared their vulnerability analysis document with Apple without delay.
Additionally they famous that Apple’s MIE, like maximum safety mitigations lately in use, was once constructed “in a global prior to Mythos Preview,” including that during a time when even small groups, with the assistance of AI, could make discoveries akin to this one, “we’re about to be informed how the most productive mitigation era on Earth holds up throughout the primary AI bugmageddon.”
To learn Calif’s complete publish, observe this hyperlink.
Value trying out on Amazon


FTC: We use source of revenue incomes auto associate hyperlinks. Extra.




