Hacker and security researcher @pattern_F_ issued a stern reminder to avid jailbreakers Tuesday afternoon about the potential dangers of a jaw-dropping security flaw discovered in iOS & iPadOS 14.0-14.3.
Exploit
PoC released for kernel-level exploit affecting up to and including iOS & iPadOS 14.7
Hot off the heels of Apple’s newly released iOS & iPadOS 14.7.1 software update Monday afternoon, the company published a page entitled “About the security content of iOS 14.7.1 and iPadOS 14.7.1.” The notes describing what this update patches are somewhat shocking.
Ian Beer publishes PoC that could allow arbitrary code execution on iOS 14.4-14.5.1
Modern jailbreak tools like Taurine and unc0ver can currently jailbreak all iOS & iPadOS 14 devices running up to and including iOS & iPadOS 14.3. It’s been quite a while since any of these tools have picked up support for new firmware, but there’s always the very real possibility that these tools could add support for new firmware in the future.
Fortunately for those whose devices are operating on iOS or iPadOS 14.4 through 14.5.1, there just might be some hope. Renowned security researcher Ian Beer of Google Project Zero has just released documentation of what appears to be a kernel-level proof of concept (PoC) impacting up to and including iOS & iPadOS 14.5.1.
Arbitrary code execution achieved on iOS 14.5.1 and below, write-up purportedly coming at a later date
Apple just yesterday released iOS & iPadOS 14.6 to the general public to lay the groundwork for Apple Music’s upcoming lossless playback option, support Apple Card Family, and more. But that's not all...
Also worth noting is that iOS & iPadOS 14.6 patched a number of security vulnerabilities, including one that purportedly allowed security researcher @xerub to gain arbitrary code execution by simply parsing a carefully crafted certificate.
Everything you should know about jailbreaking A11 devices on iOS 14 with checkra1n
Thanks to the checkm8 bootrom exploit that powers it, the checkra1n jailbreak has earned a reputation for its resilience. No mere software update can patch this exploit, and so susceptible devices (those equipped with A7-A11 chips) should effectively be jailbreakable for life...
Apple’s brand new AirTag has already been hacked
Apple announced its new AirTag tracking accessory at the Spring Loaded event just over two weeks ago, and the first deliveries only started reaching the hands of avid customers last weekend.
Despite how new the product is, it seems that it has already been hacked by brilliant minds in the security research space.
CoolStar pwns Apple Watch with the cicuta_verosa exploit
The quest to pwn the Apple Watch is one that has received oodles of attention over the years, and while the concept is most certainly possible, it hasn’t quite reached the level of fruition that most jailbreakers would expect – especially when compared with the jailbreak offerings for iPhones and iPads.
Much of this has to do with the uncertainty of an Apple Watch jailbreak’s usefulness in addition to concerns related to restoring the Apple Watch’s firmware in the event of catastrophic errors (respring loops, etc.), but that hasn’t stopped some jailbreak developers from dabbling with the idea.
Unc0ver jailbreak updated to v6.1.2 with several bug fixes and notable new features
Pwn20wnd’s unc0ver jailbreak was the first semi-untethered tool to add support for iOS & iPadOS 14.0-14.3 back in February, but recent attention shifted to the Odyssey Team’s Taurine jailbreak for iOS & iPadOS 14.0-14.3 given that it just launched last week.
Still, that hasn’t stopped Pwn20wnd from cranking out regular revisions to unc0ver. Just this evening, the unc0ver jailbreak received an update to version 6.1.2 with a number of new stability improvements and a shiny new safety feature that jailbreakers may find helpful.
Auto-executing ap0110 jailbreak for 32 & 64-bit iOS 10 devices now available
The jailbreak community has been on fire lately. Not only have all iOS & iPadOS 14.0-14.3 devices been made pwnable by both the tried and true unc0ver and brand new Taurine jailbreak tools, but the recent release of the kok3shi jailbreak made it possible for users of 64-bit iOS 9.3-9.3.5 devices to pwn their handsets as well.
Now, it seems a little more love is being provided for iOS 10 users as the Athenus Dev Team and w212 have teamed up to release ap0110, an auto-executing semi-untethered jailbreak for 32 and 64-bit iOS 10.x devices.
How to install the Taurine jailbreak on iOS or iPadOS 14.0-14.8.1 via AltStore
In case you’ve been living under a rock, the Taurine jailbreak is now officially available for all iOS & iPadOS 14.0-14.8.1 devices.
CoolStar announces upcoming Taurine jailbreak for iOS & iPadOS 14.0-14.3
Ever since @ModernPwner dropped the cicuta_verosa kernel exploit for iOS & iPadOS 14.0-14.3 devices, we knew it’d only be a matter of time before jailbreaks would pick up support.
Pwn20wnd was the first to the party after adding iOS & iPadOS 14.0-14.3 support to the unc0ver jailbreak with a custom kernel exploit based on cicuta_verosa, but it just so happens that CoolStar was also working on an iOS 14.0-14.3 jailbreak that uses the cicuta_verosa kernel exploit directly.
CoolStar seeds second beta of Odyssey v1.3.1 with bootstrap fix for cicuta_verosa exploit
Just under a week ago, CoolStar seeded Odyssey v1.3.1 beta 1 to members of the Sileo / Odyssey Discord channel for public beta testing. The biggest change was initial support for the new cicuta_verosa kernel exploit by @ModernPwner.
It wasn’t long after the beta release that the Odyssey Team learned of an issue involving bootstrapping a fresh device when using the cicuta_verosa exploit. Consequently Odyssey v1.3.1 beta 2 is now available with a fix.