Brandon Azad plans to release a new exploit for iPhone 11 on iOS 13.3

Avid jailbreakers sporting any of Apple’s latest A13-equipped handsets have yet to see any official jailbreak solutions for their particular devices. But could that change in the foreseeable future?

Hacker and iOS security researcher Brandon Azad took to Twitter Tuesday afternoon to announce an exceptional tidbit of news – namely that he would release a proof-of-concept exploit that can achieve read/write on an iPhone 11 running iOS 13.3:

Azad is particularly well known in the jailbreak community, and for good reasons. He previously released tfp0 exploits that were used in both the Chimera and unc0ver jailbreaks, and from what we can gather, this new exploit is of the tfp0 variety too, which makes it a potentially viable solution for enthusiastic jailbreakers.

Azad specifically notes that this exploit works on the iPhone12,3 (17C54) with iOS 13.3, but we can only speculate that with a little bit of tweaking, it can be made to work with other A13-equipped devices as well. Again, this is only speculation, and by no means confirmed.

In a related /r/jailbreak posting, unc0ver lead developer Pwn20wnd chimed in on the news, suggesting that A12(X) users on iOS 12 stay where they are. But perhaps more importantly, he expressed an interest in Azad’s exploit, adding that he has “PacLess techniques should work on iOS 13 and A13 but there are a few things which will need to be updated.”

Unfortunately, Pwn20wnd doesn’t have an A13 device as of now, and this limits what we can do in terms of exploit tinkering. He does, however, plan to pick one up soon so that he won’t need to rely on remote testers when working on projects.

When asked whether a jailbreak would be released for A13, Pwn20wnd replied simply with “No ETA for now,” which is wise considering that the exploit hasn’t even been released yet. Obviously, we don’t know if a jailbreak will actually materialize out of this exploit yet, but it would be awesome if one did.

iOS 13.3 is still being signed by Apple at the time of this writing, so if you have an iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max, or any other A13-equipped device, you may want to consider downgrading to iOS 13.3 while you still can to lock in your jailbreak eligibility when the exploit surfaces.

As always, you can use the online IPSW.me utility to discern if iOS 13.3 is still being signed for your device. You won’t want to drag your feet on this either, as iOS 13.3.1 has already been out for about a week.

Are you excited about this upcoming exploit? Let us know in the comments section below.