Saturday, December 2, 2023

Apple released an Emergency Update for Vulnerability that allows iPhone Jailbreak

Apple accidentally unpatched the vulnerability that was already patched in the latest security update published in June.

The vulnerability was initially discovered by Ned Williamson, he published the exploit dubbed SockPuppet and the vulnerability was initially fixed with version iOS 12.3 and broken again in 12.4.

Recently a security researcher with twitter handle Pwn20wnd published the free jailbreak exploit code on Github that works for an up-to-date version of iPhone 12.4.

This vulnerability not only let allows to Jailbreak the devices, but it also allows makes the device vulnerable to hackers.

According to thePwn20wnd, a researcher who created the Jailbreak told Motherboard that “somebody could make a perfect spyware” taking advantage of Apple’s mistake.

Several Twitter users posted stories on twitter stating that they have successfully exploited iOS 12.4 with Pwn20wnd jailbreak code.

Here you can find how to Jailbreak the iOS 12.4 using the

Patch Published for iPhone Jailbreak

Apple again patched the use after free vulnerability CVE-2019-8605 that allows a malicious application may able to execute arbitrary code with system privileges.

The update is available for iPhone 5s and later, iPad Air and later, and iPod touch 6th generation.

“A malicious app could include an exploit for this bug that allows it to escape the usual iOS sandbox—a mechanism that prevents apps from reaching data of other apps or the system—and steal user data.”


Latest articles

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles