In today's video, we're discussing a new Kernel vulnerability PoC released by security researcher Brandon Azad of Google Project Zero for iOS 12.1.2 and lower all the way down to iOS 11.4 (and possibly lower). The vulnerability is the same as the one demonstrated by security researcher @S0rryMyBad, however, the PoC is more detailed, much better documented and the approach is a bit different in Brandon's case, which makes it valuable for anybody who wants to understand the bug better and possibly use it for Jailbreak purposes.
And yes, the vulnerability can, in fact, be exploited to get the kernel task port or tfp0 on iOS 12.x up to #iOS 12.1.2 and iOS 11.4 and iOS 11.4.1. The details about how to do that have been given out in a writeup by S0rryMyBad a few days ago and although no code has been published, given enough knowledge about the kernel and Mach messages, one could indeed follow the instructions in the write-up. The #PoC works fine on A12 devices too, so once tfp0 is obtained it would also work on the #iPhone XR, iPhone XS and iPhone XS MAX which is huge news for the #Jailbreak community since these devices use PAC or Pointer Authentication Codes to prevent just that. Looks like Apple has to rethink their protections thanks to S0rryMyBad and Brandon Azad of Google Project Zero.
Don't forget to subscribe to stay updated with the latest iOS Jailbreak news.
▽ Resources ▽
▶ iOS 12.1.2 / 11.4.1 JAILBREAK POC AND TFP0 EXPLOIT DETAILS & DEMO RELEASED!
▶ iOS 12.1.2 / 12 How to Get Tweaked iOS ++Apps and Games (NO COMPUTER / NO JAILBREAK)
▶ iOS 12.0 / 12.1.2 HUGE JAILBREAK NEWS: KERNEL EXPLOIT CONFIRMED TO BE RELEASED SOON
▶ SILEO REAL CYDIA ALTERNATIVE RELEASED (It's quite good!) [COMPLETE REVIEW]