A5 to A11 Bootrom chipset jailbreak vulnerability for iOS devices cannot be fixed.

A5 to A11 Bootrom chipset jailbreak vulnerability for iOS devices cannot be fixed.

iOS devices running A5 to A11 chipsets (Apple Watch, AppleTV, iPad, iPhone, iPod Touch) are vulnerable to a jailbreak methodology at the bootrom level which cannot be fixed. The foundation code for this jailbreak has been posted to GitHub and the vulnerable devices are not remediated through operating system updates: bootrom is code that is executed prior to the operating systtem load.

The good news is physical access to the device is required to execute this vulnerability and data on the device may not be compromised. If executed, the vulnerability ends when the device is re-booted.

The bad news is this foundation code is a stepping stone to allow jailbreaking these devices to develop future exploits (from the article linked below):

Though it isn't an all-in-one jailbreak on its own, the exploit provides an extensive foundation for researchers to build off of in customizing jailbreaks for every vulnerable model of device that would allow them to totally take over the unit, run software far beyond what Apple normally allows, and program apps to interact and share data in ways that Apple's protections usually preclude.


#iOS #vulnerability #jailbreak





要查看或添加评论,请登录

Mark Burke, CISSP的更多文章

社区洞察

其他会员也浏览了