In this video, we're discussing @S0rryMyBad's latest release of a Local Privilege Escalation (LPE) Safari Proof Of Concept (PoC) bug that can be used for a Remote Jailbreak on iOS 13.1.3, iOS 13.1.2, iOS 13.1, iOS 13.0 and iOS 12.4.1. This bug was patched on iOS 13.2 by Apple, but it's usable on lower versions for all devices including the A12 and A13 devices such as iPhone XS, iPhone XS Max, iPhone XR, iPhone 11 and iPhone 11 Pro.
While this is not a tfp0 kernel exploit, an LPE is a powerful thing that is a good head-start for the #A12 and #A13 devices that are not compatible with the CheckM8 exploit used on the rest of the devices for an iOS 13 Jailbreak. Therefore, the release is welcome. According to security researcher @S0rryMyBad, this bug was intended for the Tianfu Coup, but it was patched before the event, so he decided to release it. The released datasheet is, however, in Chinese, so we'll need a proper translation before we could use it. Still, an interesting release. It's the first bug we get that works on A12 and A13 devices on iOS 13.x.
As always, do not forget to SUBSCRIBE to stay updated with the latest #iOS and #Jailbreak news, updates and tutorials!
While this is not a tfp0 kernel exploit, an LPE is a powerful thing that is a good head-start for the #A12 and #A13 devices that are not compatible with the CheckM8 exploit used on the rest of the devices for an iOS 13 Jailbreak. Therefore, the release is welcome. According to security researcher @S0rryMyBad, this bug was intended for the Tianfu Coup, but it was patched before the event, so he decided to release it. The released datasheet is, however, in Chinese, so we'll need a proper translation before we could use it. Still, an interesting release. It's the first bug we get that works on A12 and A13 devices on iOS 13.x.
As always, do not forget to SUBSCRIBE to stay updated with the latest #iOS and #Jailbreak news, updates and tutorials!