On May 14, 2026, Palo Alto Security Research company Calif released a 55-page comprehensive technical report on its official blog, announcing a major breakthrough: the research team achieved a complete privilege escalation from standard local user permissions to root shell in just five days on devices equipped with M5 chips running the latest macOS. The exploitation process required no code injection and was a pure "data-only" attack. The report quickly attracted high attention from the security community.
5 Days vs 5 Years: An Extremely Tight Attack Chain Development Timeline
The timeline of the Calif team is astonishing:
- April 25: Researcher Bruce Dang discovered two known categories of kernel bugs;
- April 27: Dion Blazakis joined, and Claude Mythos Preview began providing auxiliary analysis;
- May 1: Josh Maine completed the toolchain, and the full exploit successfully ran on a physical M5 chip device (macOS 26.4.1, MIE fully enabled).
They combined two zero-day kernel bugs, side-channel tag collision techniques, and data-only privilege escalation technology to build an efficient local privilege escalation chain.
MIE Protection Bypassed: The First Crack in Apple's Hardware Memory Security Ceiling
MIE (Memory Integrity Extension) is a hardware-level memory security mechanism developed by Apple for the M5/A19 series chips, further enhanced based on ARM MTE. It assigns 4-bit tags per 16 bytes of memory, which are checked by hardware, with a performance overhead of only about 3%. Previously considered the "next-generation memory security ceiling," it had rendered multiple well-known exploit kits ineffective.
Calif's team has now proven that even MIE can be bypassed with the right combination of vulnerabilities and side-channel techniques. They successfully reduced the tag collision probability from a random 6.25% to a deterministic implementation, achieving kernel privilege escalation through pure data operations. This is the first publicly disclosed exploitation targeting the M5 chip's MIE in macOS kernel memory.
Researchers stated in the report: "MIE was never designed to prevent all hackers, and it can be bypassed with the right vulnerabilities."
Claude Mythos Preview: AI Becomes a Super Accelerator in Cybersecurity Battles
Anthropic's Claude Mythos Preview (security-specific version) played a key role in this research. The model was limitedly available to top security teams through the Project Glasswing program, enabling the rapid discovery of numerous cross-system, browser, and critical infrastructure zero-day vulnerabilities, including long-untouched "vintage" bugs.
The Calif team emphasized: "This was not done by AI alone but by a strong collaboration between top human researchers and cutting-edge AI. A small team could complete work that previously took months or even years in just a few days." After completing the research, the team personally visited Apple Park to present their findings, and Apple has already fixed the related vulnerabilities in the macOS 26.5 security update, publicly thanking Calif and Anthropic Research for their collaboration.
Deeper Insights: The Era of AI-Driven 'Bugmageddon' Has Arrived
Calif warned in the report's conclusion: "This is just the tip of the iceberg." While defenders use AI to find and fix vulnerabilities, attackers also use AI to accelerate discovery and exploitation, leading to an exponential increase in vulnerability discovery speed, completely challenging traditional manual auditing models.
This research has been included in Calif's "Month of AI-Discovered Bugs" series, marking that AI has become a core variable in cybersecurity battles, rather than just a supporting tool. The explorations by OpenAI and Anthropic on different technical paths are accelerating this trend.
Practical Impact and Recommendations for Mac Users
This vulnerability enables local privilege escalation, requiring the attacker to have local code execution privileges, so remote exploitation risk is low. However, Apple has quickly pushed out the macOS 26.5 security update. AIbase strongly recommends all Mac users to update their systems immediately.
The Calif team reminded: "This is just the tip of the iceberg." In the future, many highly protected systems built over years may be quickly broken through with AI assistance.
AIbase's Viewpoint: AI is comprehensively reshaping the landscape of cybersecurity. Whether for defense or research, proactively embracing AI tools has become an inevitable choice. The collaborative model between tech giants and the security community may become the new industry norm in the future.
