Anthropic Mythos AI uncovers macOS M5 kernel vulnerabilities
Anthropic Mythos AI enabled researchers to find two previously unknown macOS kernel vulnerabilities on M5 silicon. The flaws were chained into a privilege-escalation exploit that bypassed Memory Integrity Enforcement. The work took five days and roughly $35,000 in API usage. Researchers delivered a 55-page report to Apple headquarters. The demonstration on an M5 Max under macOS 26.4.1 produced the first public macOS kernel memory-corruption case on M5 hardware.
Three researchers used Anthropic's Mythos to build a working macOS kernel exploit that bypasses Apple's M5 Memory Integrity Enforcement, a security system Apple spent five years and billions of dollars building.
Bug found April 25. Working exploit May 1. Walked into Apple Park to deliver the report in person.
MIE was the flagship security feature of the M5 and A19, designed to kill the entire memory corruption bug class. According to Apple's own research, it disrupted every known public exploit chain against modern iOS.
Calif didn't break MIE. They walked around it. Data-only attack, no pointer manipulation, standard syscalls from an unprivileged user to root.
The 55-page technical report drops after Apple patches. This is the story of the year in cybersecurity.