Close ad

A new security exploit for iOS devices has appeared on the Internet, which exploits a flaw in the hardware security of selected Apple products, thereby enabling the deployment of a "permanent" (irreparable) jailbreak.

The exploit, called Checkm8, was posted on Twitter and later appeared on GitHub. For all those interested in this issue, we provide a link PULL. Those who are content with a simplified summary can read on.

The Checkm8 security exploit uses bugs in the so-called bootrom, which is the basic (and immutable, i.e. read-only) code that works on all iOS devices. Thanks to this bug, it is possible to modify the target device in such a way that it can be permanently jailbroken. This one, in contrast to normally functioning jailbreaks, is specific in that it cannot be removed in any way. So, for example, updating the software to a newer revision won't make the jailbreak go away. This has far-reaching security implications, especially as it bypasses the iCloud lock on iOS devices.

Checkm8 needs specific hardware to function. Simply put, the Checkm8 exploit works on all iPhones and iPads from the Apple A5 processor (iPhone 4) to the Apple A11 Bionic (iPhone X). Since it uses specific hardware and bootrom to function, it is not possible to eliminate this exploit with the help of a software patch.

jailbreak infinity fb

Source: Macrumors, 9to5mac

.