That's because Axi0mX's findings also have major implications for iOS device security, if bad actors abuse the publicly available vulnerability. "If you're anyone else, it's horrifying." "This is probably the biggest thing to cross most iOS security researchers’ desks in their entire careers to date," says Thomas Reed, a Mac and mobile malware research specialist at the security firm Malwarebytes. That changed over time and since iOS 9 jailbreaks became less frequent, much less convenient, and not something easily accessible to everyone." "The best days for iOS jailbreaking were years ago, when jailbreaks were common, easy to use, and available often. Though it isn't an all-in-one jailbreak on its own, the exploit provides an extensive foundation for researchers to build off of in customizing jailbreaks for every vulnerable model of device that would allow them to totally take over the unit, run software far beyond what Apple normally allows, and program apps to interact and share data in ways that Apple's protections usually preclude. It affects every Apple device with an A5 through A11 chipset, meaning every iPhone model from 4S to X. Security researcher Axi0mX published the exploit, called "checkm8," Friday on Github. But today a security researcher published an exploit that lays the foundation to jailbreak almost every single iOS device released between 20, including most models of iPad, Apple Watch, iPod Touch, and Apple TV. When one appeared in August for iOS 12, it was surprising to even the most dedicated Apple hackers. For the last several years, so-called jailbreaks of iPhones-cracking iOS to let any software run on the device-have been exceedingly rare.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |