New 'OOB Timestamp' Exploit Released for A12/A13 Devices on iOS 13 - 13.3
Posted February 8, 2020 at 5:29am by iClarified
A new exploit for A12 and A13 devices running iOS 13.0 to iOS 13.3 has been released by Brandon Azad.
In post on chromium.org, Azad introduces 'oob_timestamp', a proof-of-concept research exploit that exports the kernel task port.
In its current form, the exploit is designed not to work generically: it needs to be "tuned" to the specific research device on which it will be run. See oob_timestamp/README for a description of how to perform this tuning. I may release a more complete exploit at a later time.
The proof of concept exploits an iPhone 11 on iOS 13.3; however, developer Pwn20wnd has already said he is working to integrate the exploit into unc0ver which will bring support for jailbreaking iOS 13-13.3 on the iPhone XR, XS, XS Max, 11, 11 Pro, and 11 Pro Max.
Please download the iClarified app or follow iClarified on Twitter, Facebook, YouTube, and RSS for jailbreak updates.
Read More
In post on chromium.org, Azad introduces 'oob_timestamp', a proof-of-concept research exploit that exports the kernel task port.
In its current form, the exploit is designed not to work generically: it needs to be "tuned" to the specific research device on which it will be run. See oob_timestamp/README for a description of how to perform this tuning. I may release a more complete exploit at a later time.
The proof of concept exploits an iPhone 11 on iOS 13.3; however, developer Pwn20wnd has already said he is working to integrate the exploit into unc0ver which will bring support for jailbreaking iOS 13-13.3 on the iPhone XR, XS, XS Max, 11, 11 Pro, and 11 Pro Max.
Please download the iClarified app or follow iClarified on Twitter, Facebook, YouTube, and RSS for jailbreak updates.
Read More