iBSparkes demos 0day on brand-new iOS 13 beta 1 firmware

Apple launched the first developer beta of iOS 13 just this afternoon after the WWDC 2019 Keynote presentation came to an end, and despite how new this beta software is, talented security researchers are already findings ways to crack it.

In a Tweet shared just this evening, @iBSparkes flexed his l33t hacking skills by sharing what appears to be a demonstration of an undisclosed 0day vulnerability:

The hacker demonstrates that he’s on the iOS 13 beta by showing off the operating system’s new native dark mode in the Settings app. Upon closing the app, he then moves to the second page of his Home screen and launches an unknown app that results in what appears to be a SpringBoard crash.

It may not seem like much to the untrained eye, but what iBSparkes has done here is successfully invoke a kernel panic with the help of a homebrew app, which is purportedly indicative of a vulnerability. Not bad for just a couple of hours with Apple’s latest and greatest firmware…

It remains to be seen if this 0day will be released or if it will help in any way with the development of a future jailbreak, but it’s worth noting that there’s still plenty of time between now and when Apple releases iOS 13 in the fall for the Cupertino-based company to release a fix. On the other hand, since this is a 0day, Apple hasn’t been notified about how it works just yet.

Apple attempts to make iOS more secure with each incremental release, but this doesn’t mean that iOS 13 is unjailbreakable. In fact, prominent hackers like unc0ver lead developer Pwn20wnd would agree with this logic.

If we had to guess, it’d only be a matter of weeks or months before we see the very first jailbreak demonstration from a security research team such as KeenLab… and while they never release their jailbreaks, these demonstrations still go to show that Apple’s latest and greatest software can be pwned.

Are you excited to see if iOS 13 ever gets jailbroken? Tell us why or why not in the comments section below!