Jailbreak for any IOS devices


Last weekend, a team of information security experts and reverse engineers introduced a new version of the Unc0ver jailbreak (5.0.0). This tool works for almost any iPhone, even with the latest iOS 13.5 on board.

Unc0ver authors say it exploits a zero kernel vulnerability in the iOS kernel, which Apple experts are not yet aware of. The vulnerability was discovered by one of the team members, who is known under the pseudonym Pwn20wnd.

Pwn20wnd himself says that for the first time in five years, jailbreak is relevant even for the current, most recent version of the operating system. The last time a similar tool was released in 2014. The fact is that usually jailbreaks exploit old vulnerabilities in iOS and, accordingly, do not work with the current version of the operating system, where these “holes” are already fixed. As a result, owners of jailbroken devices often prefer not to just update the OS.

Shortcomings of the Jailbreak:

  1. iOS is one of the most secure operating systems, including due to the fact that the user has no access to the file system. If access to it is open, what happens when jailbreaking, picking up a trojan or a virus becomes much easier.
  2. Installing Jailbreak may cause problems with the device. Sometimes it happens that the iPhone or iPad turns into a “brick”, and often through the fault of the user, if he did not perform the action that he sees on the screen during the jailbreak procedure. Responsibility for this, of course, lies only with the owner of the device.
  3. Jailbreak void iPhone or iPad warranty.

At the same time, Pwn20wnd claims that the use of an unknown 0-day problem and jailbreak of devices with its help do not affect security in any way. It does not open the device for attacks. According to Pwn20wnd, Apple experts will release a patch for a new vulnerability in the next 2-3 weeks.

Unc0ver developers also write that they tested their jailbreak on iOS versions 11 to 13.5. Jailbreak does not work only for iOS versions 12.3 through 12.3.2 and 12.4.2 through 12.4.5.

Leave a Reply