Those paying close attention to the jailbreak community as of late would already know that there’ve been a number of recent developments that could eventually spell out the jailbreakability of iOS 13.5.1-13.7. If you missed the news, FreeTheSandbox is working on a public jailbreak supporting these firmware versions while security researcher @08Tc3wBB plans to release a dedicated exploit for use by the jailbreak community.
Neither of the aforementioned things have happened yet, but for those trying to keep tabs on everything as it happens, it might be worth mentioning that @08Tc3wBB plans to discuss his iOS 13.5.1-13.7 exploit on November 19th via HITB CyberWeek in a talk entitled “Jailbreaks Never Die: Exploiting iOS 13.7.”
In a brief published on the HITBCyberWeek official website, we learn what the talk will be about in the words of @08Tc3wBB:
This talk will reveal the iOS 13 exploits I showcased earlier on Twitter (@08Tc3wBB) – an exploit chain for iOS 13.7 that relies upon a different kernel vulnerability since the 13.6 update patched the old one. I’ll be talking about the root cause and techniques used during the exploit development to bypass the mitigations that are unique to iOS to ultimately get the privilege of reading and writing kernel memory.
Jailbreaks never die!
@08Tc3wBB, a Bug Bounty Hunter and security researcher with ties to software security firm ZecOps, has said previously that his iOS 13.5.1-13.7 exploit would be released to the public in due time. More importantly, it will be shared with Pwn20wnd of the unc0ver team, a move that could spell out one of the most popular jailbreak tools in recent memory picking up support for even more versions of iOS.
The unc0ver jailbreak tool already supports versions of iOS spanning 11, 12, and 13. No jailbreak tool besides checkra1n is currently capable of jailbreaking iOS 14, and that only encompasses a small number of older handsets vulnerable to the checkm8 bootrom exploit. We can only assume that other jailbreak tools such as Odyssey could pick up support at a later date following the exploit’s official release.
As we shared at the beginning of October, @08Tc3wBB is also slated to talk about his iOS 13.5.1-13.7 exploit at Black Hat Europe 2020.
We’ve always been enormous fans of security research talks like these because it allows the community to learn more about the security researchers who help make jailbreaks possible. It’s not just exciting to pin a face to the individuals who keep the wheels turning, but also to hear from their unique perspectives how they do the things they do.
Are you excited about the upcoming iOS 13.5.1-13.7 exploit by @08Tc3wBB? Share in the comments section down below.