HeadlinesBriefing favicon HeadlinesBriefing.com

Apple's MIE Security Bypassed by Small Team in Five Days

Hacker News •
×

Apple's Memory Integrity Enforcement (MIE) represents five years of engineering and brand-new M5 silicon, featuring hardware memory tagging and read-only kernel zones. Despite calling itself a 'generational leap,' the sophisticated protection system fell to a three-person team with AI assistance. Their exploit achieved root access from an unprivileged local user in just five days, marking the first public macOS kernel bypass on M5 hardware.

The vulnerability lived in _zalloc_ro_mut, the sole kernel function permitted to modify read-only zones. An integer overflow in bounds checking allowed attackers to write past allocated slots into protected kernel structures. When target + len wraps past 2^64, the validation passes incorrectly, letting memcpy write into adjacent ucred structures and task_t blocks that MIE was designed to shield. This single bug undermined the entire hardware-software security stack.

Apple's patch is remarkably concise—just two additional instructions adding per-CPU bounds checking. The fix validates that target + len stays within per-CPU lower and upper limits before any memory operations. This demonstrates both the elegance of modern mitigations and their fundamental fragility when integer arithmetic goes wrong. CVE-2026-28952 reminds us that even cutting-edge hardware security can crumble on basic validation errors.

Memory safety bugs drive roughly 70% of critical vulnerabilities across major software platforms. From Pegasus spyware to iOS jailbreaks, the pattern repeats endlessly. While compiler hardening and sandboxing provide layers of defense, hardware-level protections like MIE aim to make exploitation impossible even when bugs exist. This incident proves the approach works—until it doesn't. The real solution requires eliminating these vulnerabilities at their source through memory-safe languages and better tooling.