First public macOS kernel memory corruption exploit on Apple M5
A security researcher has released the first public kernel memory corruption exploit targeting Apple's M5 chip, as detailed on their blog. The exploit, published on May 14, 2026, demonstrates arbitrary kernel read/write access, enabling attackers to bypass system integrity protections. The vulnerability resides in the M5's memory management unit and affects all macOS versions on M5 devices. No official patch or mitigation has been released by Apple. The researcher responsibly disclosed the issue to Apple prior to publication, but the timeline for a fix remains unknown. This exploit marks a significant milestone in public macOS security research, as previous M-series chips had no publicly known kernel exploits. Developers and security teams should monitor for updates and consider additional hardening measures.
First public kernel exploit for M5 chips, exposing critical macOS security gaps.