The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Checkm8 Exploit"
(Added CVE information and the fact that the Touch Bar and it’s chip (T2) are also vulnerable) |
|||
Line 3: | Line 3: | ||
[[ipwndfu]] and [[checkra1n]] are currently the main tools capable of using the checkm8 exploit. |
[[ipwndfu]] and [[checkra1n]] are currently the main tools capable of using the checkm8 exploit. |
||
+ | |||
+ | == References == |
||
+ | * [https://habr.com/en/company/dsec/blog/472762/ Technical analysis of the checkm8 exploit] |
||
+ | |||
[[Category:Exploits]] |
[[Category:Exploits]] |
Revision as of 13:32, 25 May 2020
The checkm8 exploit is a bootrom exploit with a CVE ID of CVE-2019-8900 used to run unsigned code on iOS, iPadOS, tvOS, and Touch Bar devices with processors between an A5 and an A11 or a T2 (and thereby jailbreak it).
ipwndfu and checkra1n are currently the main tools capable of using the checkm8 exploit.