This is the CMA 1990:-
https://www.legislation.gov.uk/ukpga/1990/18/crossheading/computer-misuse-offences
And i'm just going to highlight the part that I think is pertinent.
(1)A person is guilty of an offence if—
(a)he does any unauthorised act in relation to a computer;
(b)at the time when he does the act he knows that it is unauthorised
Anybody in IT should not have the slightest difficulty understanding the computer misuse act which is simply a series of IF & ANDIF statements combined with the occasional ELSEIF.
The key point there is "does any unauthorised act", AND "at the time when he does the act he knows that it is unauthorised". Causing the condition to fail is incredibly, incredibly easy and can be summed up with two words, namely "GET PERMISSION".
Obtaining written permission from somebody at the organisation who might reasonably be expected to be able to grant that permission (ie, somebody in IT or the office manager, and not the office junior, cat, pot plant etc) represents a complete and total bar against any form of prosecution. Even if it later turns out that the person later turns out not to have permission to grant that authorisation, if you reasonably believed that you had permission at the time then you are legally in the clear.
I personally do not understand why this is a problem for security researchers. If you are conducting unauthorised "security research" upon a computer system then this appears to simply be a digital version of "casing a target for burglary". This appears to me to be legally correct; the entire distinction is one of "do you have permission to do that?".
If I hire a security company do check the physical security on my house then they are authorised to attempt to case the joint and produce a list of suggested improvements and estimates of the cost benefit ratio of said improvements etc and the same situation is true in the digital realm. If a random person does the same thing without authorisation then they are subject to arrest and prosecution either "casing my house", or in the digital realm "casing my computer system".
I'm not seeing that as being unreasonable, and I would like to know very exactly and specifically what "security researchers" actually expect to be allowed to do with legal immunity from prosecution.
From where i'm sitting as a sysadmin I don't think that conducting unauthorised "security research" should be legal any more than a locksmith should be allowed to conduct "security research" against the lock on the door of my house without my permission. I would suspect that most property owners and sysadmin types will agree with me on both points.
"Security researchers" probably disagree, but I have a sneaking suspicion that it is not unreasonable to suggest that one persons security researcher is another persons hacker, and there are obvious objections to granting any form of legal protection to unethical, unsupervised, unlicensed, uninsured and unwanted intruders.