New 'OOB Timestamp' Exploit Released for A12/A13 Devices on iOS 13 - 13.3
LIKE
TWEET
SHARE
PIN
SHARE
POST
MAIL
MORE
Posted February 8, 2020 at 5:29am by iClarified · 14715 views
A new exploit for A12 and A13 devices running iOS 13.0 to iOS 13.3 has been released by Brandon Azad.
In post on chromium.org, Azad introduces 'oob_timestamp', a proof-of-concept research exploit that exports the kernel task port.
In its current form, the exploit is designed not to work generically: it needs to be "tuned" to the specific research device on which it will be run. See oob_timestamp/README for a description of how to perform this tuning. I may release a more complete exploit at a later time.
The proof of concept exploits an iPhone 11 on iOS 13.3; however, developer Pwn20wnd has already said he is working to integrate the exploit into unc0ver which will bring support for jailbreaking iOS 13-13.3 on the iPhone XR, XS, XS Max, 11, 11 Pro, and 11 Pro Max.
My iPhone SX was on 12.4 so I totally gave up on jailbreaking it and upgraded using WiFi ( the computer is in the shop ). Then I here about a jailbreak coming and to hurry up downgrade to 13.3, the problem is that because of the Corona bug people are afraid to fly to any vacation resort thinking that it’s a chance that even if you fly to London you really don’t know where the airplane have been at the last few flights and because of that so many flights and hotels are cheap as hell ( up to P off ) and all my friends disappeared, paid almost nothing and are having the time of their life traveling Europe. So I can’t find a computer to install iOS 13.3. AND then yesterday wanting to save SHSH2 using the telegraph
Telegram App I needed some information so I went to Settings, General, About AND TO MY AMAZEMENT I DISCOVERED THAT MY IPHONE WAS ON iOS 13.3 not 13.3.1 all I can say upgrading yesterday was a MIRACLE !!!!!!! But with my iOS 12.1 jailbroken iPad Pro I’m not taking the chance unless maybe if I use a PC if I find one.