An iOS security researcher with twitter handle Axi0mX released an Epic Jailbreaking tool dubbed Checkm8, exploit iOS device form iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).
The tool is compatible with Mac and Linux and the tool will not work for the virtual machine. Also, the tool can be downgraded to jailbreak iPhone 3GS. To note Checkm8 is only the exploit not the Jailbreak tool with Cydia.
The exploit was published for free, by using the exploit iOS jailbreak community and researchers can develop a complete jailbreak tool.
Checkm8 leverages bootrom (called “SecureROM” by Apple), the bootrom in read-only mode, it is the first code executed on iphone while booting, exploits at this level can be fixed only by a hardware revision.
According to the researcher, the “EPIC JAILBREAK” vulnerability is permanent, “unpatchable bootrom exploit for hundreds of millions of iOS devices.”
Axi0mX also published a Jailbreak guide, Others features will be added soon, he said.
“A bootrom exploit for older devices makes iOS better for everyone. Jailbreakers and tweak developers will be able to jailbreak their phones on the latest version, and they will not need to stay on older iOS versions waiting for a jailbreak. They will be safer.”
Axi0mX said this vulnerability cannot be exploited remotely, the attackers need to have physical access to the device.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure…
The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on…
Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…
Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…
Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…
Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…