A new exploit for A12 and A13 devices running iOS 13.0 to iOS 13.3 has been released by Brandon Azad.
In post on chromium.org, Azad introduces 'oob_timestamp', a proof-of-concept research exploit that exports the kernel task port.
In its current form, the exploit is designed not to work generically: it needs to be "tuned" to the specific research device on which it will be run. See oob_timestamp/README for a description of how to perform this tuning. I may release a more complete exploit at a later time.
The proof of concept exploits an iPhone 11 on iOS 13.3; however, developer Pwn20wnd has already said he is working to integrate the exploit into unc0ver which will bring support for jailbreaking iOS 13-13.3 on the iPhone XR, XS, XS Max, 11, 11 Pro, and 11 Pro Max.
Would you like to be notified when someone replies or adds a new comment?
Yes (All Threads)
Yes (This Thread Only)
No
Notifications
Would you like to be notified when we post a new Apple news article or tutorial?
Yes
No
Comments (3)
Comments are closed for this article.
0
odedoo1 - February 10, 2020 at 3:44pm
My iPhone XS was on 12.4 so I upgraded using WiFi (the computer is in the shop). Then I heard about a jailbreak coming and to hurry up and downgrade to 13.3. I can't find a computer to install iOS 13.3, and then yesterday wanting to save SHSH2 using the telegram...
0
odedoo1 - February 10, 2020 at 3:52pm
Telegram app I needed some information so I went to Settings, General, About and to my amazement I discovered that my iPhone was on iOS 13.3, not 13.3.1. All I can say is upgrading yesterday was a miracle! But with my iOS 12.1 jailbroken iPad Pro I’m not taking the chance unless maybe if I use a PC if I find one.
0
odedoo1 - February 10, 2020 at 3:21pm
My iPad Pro is jailbroken on iOS 12.1, what to do, it’s a dilemma upgrade or stay????