Pwn20wnd drops unc0ver v3.3.0 beta 6 with important bug fixes

Pwn20wnd released another update for the unc0ver jailbreak tool Saturday morning with several more important bug fixes. As of now, the latest version of the unc0ver jailbreak tool is now v3.3.0 beta 6.

Pwn20wnd announced the latest update via Twitter within the past hour, linking to its source page on GitHub in the process:

Citing the official change log for unc0ver v3.3.0 beta 6, this build incorporates the following changes:

07/13/2019 – v3.3.0~b6 was released for public testing with the following changes:

– Make the reliability even better when using the Sock Puppet exploit
– Make jailbreaking with corrupted SystemVersion.plist possible (Requested by a Redditor)
– Fix a faulty kernel patch to prevent random reboots

Just yesterday, Pwn20wnd cited a near-100% success rate for the new Sock Puppet exploit, a feat made possible with software refinements over the past week. From what we can gather, this update further improves the exploit’s reliability, and also improves the jailbreak experience further by preventing random reboots and fulfilling a request by a /r/jailbreak user to make jailbreak with a corrupted SystemVersion.plist file possible.

If you’re using an older version of unc0ver v3.3.0 beta, then you may want to deploy beta 6 to take full advantage of the random reboot mitigations and exploit reliability improvements. If you aren’t already using the unc0ver v3.3.0 beta, then we’d advise holding off until the official public release, as betas can be prone to instabilities.

It’s worth noting that unc0ver’s iOS 12.1.3-12.2 support only encompasses A9-A11 devices, but Pwn20wnd is currently investigating 4K device (A7-A8) support. If you’d like to move forward with the current build of unc0ver, then you download the latest version from Pwn20wnd’s official GitHub repository and follow our in-depth tutorial regarding how to do so.

Have you jailbroken iOS 12.1.3-12.2 yet? If so, what are you thinking of it thus far? Let us know in the comments section below.