• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

New ‘unpatchable’ iPhone exploit may allow permanent jailbreaking on hundreds of millions of iOS devices

September 27, 2019 by Andrew P. Sardaro Leave a Comment

Why is this exploit significant? It cannot be addressed with a software update, only a hardware revision can address this. Named “checkm8,” the exploit is a bootrom vulnerability (initial code that iOS devices load when they boot up) that gives hackers access to iOS devices on a level that Apple cannot block. The iOS hacker claims the exploit is permanent and can be used to create a jailbreak on all iOS devices ranging from iPhone 4s (A5 chip) to iPhone 8 and iPhone X (A11 chip). The exploit does not impact the latest two chipsets, A12 and A13.

When reading further, the jailbreak itself is not there yet, a lot of fear theory around what it could do. The article goes on to state that jailbreakers deem this to be a tethered exploit, meaning it can only be used/activated via USB and a computer. It could be a game-changer If this exploit tool leads to an untethered jailbreak which could then be applied to hundreds of missions of iOS devices.

https://thehackernews.com/2019/09/bootrom-jailbreak-ios-exploit.html

Filed Under: Week 05: Metasploit Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in