Just over two weeks ago, security researcher @S0rryMyBad announced the discovery of an exploit for iOS 12.1.2 and below for pre-A12 devices, adding that he would release information about it after Apple patched it in a software update. Fortunately, that time has finally come.
Several hours after Apple released iOS 12.1.3 to the public on Tuesday, @S0rryMyBad made good on his promise by Tweeting a proof of concept screenshot of the bug that he had teased earlier in the month:
We can gather from the Tweet that a blog post to elucidate the exploit is imminent and that the hacker intends to describe the exploit and the circumstances surrounding the exploitability of Apple’s A12-equipped handsets.
Worthy of note, this bug can achieve tfp0, which is a kernel task port that permits arbitrary reads and writes to a handset’s kernel memory. As you might recall, the exploit Ian Beer released before the iOS 11 jailbreak was of the tfp0 variety, so exploits of this nature can be powerful enough to help facilitate jailbreak development.
At the time of this writing, there’s no official word concerning whether this exploit can be used in any of the existing jailbreaks like unc0ver or Electra, but unc0ver lead developer Pwn20wnd expressed interest in @S0rryMyBad’s exploit previously, denoting that iOS 12 support could be on the hacker’s to-do list. Obviously, that’s not a guarantee, however.
As always, it’s recommended that you stay on the lowest firmware version possible.. Jailbreaks often require more than one bug, and Apple‘s patches in each software update make them that much tougher to support in a jailbreak tool. Follow the famous words, or forever hold your peace:
Note: we wouldn’t recommend updating from iOS 11 if you’re already jailbroken, but at least this could be something to look forward to if you’ve been waiting for an iOS 12 jailbreak.
iOS 12.1.1 is still being signed at the time of this writing, but that will probably change soon. If you’re using iOS 12.1.2 or 12.1.3, then you can still downgrade if you download the appropriate firmware file from our downloads page. You can check the signing status of any iOS firmware at any time via IPSW.me.
Are you excited to see an iOS 12-centric exploit in the wild? Let us know your thoughts in the comments section below.