Exploit

Ian Beer publishes PoC that could allow arbitrary code execution on iOS 14.4-14.5.1

Matrix code hacked iPhone.

Modern jailbreak tools like Taurine and unc0ver can currently jailbreak all iOS & iPadOS 14 devices running up to and including iOS & iPadOS 14.3. It’s been quite a while since any of these tools have picked up support for new firmware, but there’s always the very real possibility that these tools could add support for new firmware in the future.

Fortunately for those whose devices are operating on iOS or iPadOS 14.4 through 14.5.1, there just might be some hope. Renowned security researcher Ian Beer of Google Project Zero has just released documentation of what appears to be a kernel-level proof of concept (PoC) impacting up to and including iOS & iPadOS 14.5.1.

Arbitrary code execution achieved on iOS 14.5.1 and below, write-up purportedly coming at a later date

Matrix code hacked iPhone.

Apple just yesterday released iOS & iPadOS 14.6 to the general public to lay the groundwork for Apple Music’s upcoming lossless playback option, support Apple Card Family, and more. But that's not all...

Also worth noting is that iOS & iPadOS 14.6 patched a number of security vulnerabilities, including one that purportedly allowed security researcher @xerub to gain arbitrary code execution by simply parsing a carefully crafted certificate.

Apple’s brand new AirTag has already been hacked

Apple announced its new AirTag tracking accessory at the Spring Loaded event just over two weeks ago, and the first deliveries only started reaching the hands of avid customers last weekend.

Despite how new the product is, it seems that it has already been hacked by brilliant minds in the security research space.

CoolStar pwns Apple Watch with the cicuta_verosa exploit

The quest to pwn the Apple Watch is one that has received oodles of attention over the years, and while the concept is most certainly possible, it hasn’t quite reached the level of fruition that most jailbreakers would expect – especially when compared with the jailbreak offerings for iPhones and iPads.

Much of this has to do with the uncertainty of an Apple Watch jailbreak’s usefulness in addition to concerns related to restoring the Apple Watch’s firmware in the event of catastrophic errors (respring loops, etc.), but that hasn’t stopped some jailbreak developers from dabbling with the idea.

Unc0ver jailbreak updated to v6.1.2 with several bug fixes and notable new features

Pwn20wnd’s unc0ver jailbreak was the first semi-untethered tool to add support for iOS & iPadOS 14.0-14.3 back in February, but recent attention shifted to the Odyssey Team’s Taurine jailbreak for iOS & iPadOS 14.0-14.3 given that it just launched last week.

Still, that hasn’t stopped Pwn20wnd from cranking out regular revisions to unc0ver. Just this evening, the unc0ver jailbreak received an update to version 6.1.2 with a number of new stability improvements and a shiny new safety feature that jailbreakers may find helpful.

Auto-executing ap0110 jailbreak for 32 & 64-bit iOS 10 devices now available

The jailbreak community has been on fire lately. Not only have all iOS & iPadOS 14.0-14.3 devices been made pwnable by both the tried and true unc0ver and brand new Taurine jailbreak tools, but the recent release of the kok3shi jailbreak made it possible for users of 64-bit iOS 9.3-9.3.5 devices to pwn their handsets as well.

Now, it seems a little more love is being provided for iOS 10 users as the Athenus Dev Team and w212 have teamed up to release ap0110, an auto-executing semi-untethered jailbreak for 32 and 64-bit iOS 10.x devices.

CoolStar announces upcoming Taurine jailbreak for iOS & iPadOS 14.0-14.3

Ever since @ModernPwner dropped the cicuta_verosa kernel exploit for iOS & iPadOS 14.0-14.3 devices, we knew it’d only be a matter of time before jailbreaks would pick up support.

Pwn20wnd was the first to the party after adding iOS & iPadOS 14.0-14.3 support to the unc0ver jailbreak with a custom kernel exploit based on cicuta_verosa, but it just so happens that CoolStar was also working on an iOS 14.0-14.3 jailbreak that uses the cicuta_verosa kernel exploit directly.

CoolStar seeds second beta of Odyssey v1.3.1 with bootstrap fix for cicuta_verosa exploit

Odyssey jailbreak tool for iOS 13.0-13.7.

Just under a week ago, CoolStar seeded Odyssey v1.3.1 beta 1 to members of the Sileo / Odyssey Discord channel for public beta testing. The biggest change was initial support for the new cicuta_verosa kernel exploit by @ModernPwner.

It wasn’t long after the beta release that the Odyssey Team learned of an issue involving bootstrapping a fresh device when using the cicuta_verosa exploit. Consequently Odyssey v1.3.1 beta 2 is now available with a fix.