A new exploit threatens to offer the ultimate jailbreak for all iPhone (until 2018)

A new exploit threatens to offer the ultimate jailbreak for all iPhone (until 2018)

An expert in computer security with the alias of axi0mX has discovered an exploit for iOS that could pose the definitive solution for those who want to jailbreak on their iPhone.

The exploit, dubbed ‘checkm8’ (‘checkmate’), is a boot memory vulnerability that could not be corrected or patched by Apple with future software updates. All iPhone except for the new models would be exposed to this problem.

Apple can’t do anything to correct it

The problem with the vulnerability that exploits this exploit is the fact that it resides in the ROM (Read-Only Memory) of the device, and it cannot be overwritten or patched. It is the first vulnerability of this type that has been discovered since the last one appeared on the iPhone 4 almost a decade ago.

The exploit will allow all iPhone users up to iPhone X to jailbreak their devices without problems and without having to install old versions of iOS to exploit vulnerabilities of those versions.

Not everyone is exposed to the problem: Apple corrected that defect with Apple A12 processors, which means that the iPhone XR, XS, XS Max, 11, 11 Pro and 11 Pro Max would not be affected.

So far, a jailbreak has not appeared as such that allows exploiting the exploit, but experts say that it will not take long. That will open the doors to everyone who wants to skip Apple’s protections for example in terms of third-party software installation restrictions, but it also poses security risks.

For example, it could be used by those who steal Apple mobile phones to access user credentials or to install malware on them.

The popularity of jailbreaks has been significantly reduced especially now that iOS offers many of the options that the first exploits enabled, but this new exploit that some describe as “the most important thing that has ever happened in the world of jailbreaking” opens the door to the resurgence of this type of processes.

Via | 9to5Mac

SHARE
Previous articleMicrosoft Surface event: all the Surface news that we hope to see
Next articleYouTube Music on Android phones is Google’s latest attack against Spotify
Aakash Molpariya
Aakash started in Nov 2018 as a writer at Revyuh.com. Since joining, as writer, he is mainly responsible for Software, Science, programming, system administration and the Technology ecosystem, but due to his versatility he is used for everything possible. He writes about topics ranging from AI to hardware to games, stands in front of and behind the camera, creates creative product images and much more. He is a trained IT systems engineer and has studied computer science. By the way, he is enthusiastic about his own small projects in game development, hardware-handicraft, digital art, gaming and music. Email: aakash (at) revyuh (dot) com

LEAVE A REPLY