The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Checkm8 Exploit"
m (Added Fugu ^_^) |
m |
||
(One intermediate revision by one other user not shown) | |||
Line 2: | Line 2: | ||
The '''checkm8 exploit''' is a [[bootrom]] exploit with a CVE ID of CVE-2019-8900 used to run unsigned code on iOS, iPadOS, tvOS, watchOS, bridgeOS, audioOS, and Haywire devices with processors between an A5 and an A11, a S1P and a S3, a S5L8747, and a T2 (and thereby [[jailbreak]] it). Jailbreaks based on checkm8 are [[semi-tethered jailbreak]]s as the exploit works by taking advantage of a use-after-free in the USB DFU stack. |
The '''checkm8 exploit''' is a [[bootrom]] exploit with a CVE ID of CVE-2019-8900 used to run unsigned code on iOS, iPadOS, tvOS, watchOS, bridgeOS, audioOS, and Haywire devices with processors between an A5 and an A11, a S1P and a S3, a S5L8747, and a T2 (and thereby [[jailbreak]] it). Jailbreaks based on checkm8 are [[semi-tethered jailbreak]]s as the exploit works by taking advantage of a use-after-free in the USB DFU stack. |
||
− | [[ipwndfu]], [[Fugu]] and [[ |
+ | [[ipwndfu]], [[Fugu]], [[checkra1n]], and [[checkm8-a5]] are currently the main tools capable of using the checkm8 exploit. |
== References == |
== References == |
Latest revision as of 03:44, 27 February 2022
The checkm8 exploit is a bootrom exploit with a CVE ID of CVE-2019-8900 used to run unsigned code on iOS, iPadOS, tvOS, watchOS, bridgeOS, audioOS, and Haywire devices with processors between an A5 and an A11, a S1P and a S3, a S5L8747, and a T2 (and thereby jailbreak it). Jailbreaks based on checkm8 are semi-tethered jailbreaks as the exploit works by taking advantage of a use-after-free in the USB DFU stack.
ipwndfu, Fugu, checkra1n, and checkm8-a5 are currently the main tools capable of using the checkm8 exploit.