The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
checkm8 Exploit
Revision as of 15:15, 10 June 2020 by Inflatable Man (talk | contribs) (Added that checkm8 also supports Haywire and Homepod)
The checkm8 exploit is a bootrom exploit with a CVE ID of CVE-2019-8900 used to run unsigned code on iOS, iPadOS, tvOS, watchOS, bridgeOS, audioOS, and Haywire devices with processors between an A5 and an A11, a S1P and a S3, a S5L8747, and a T2 (and thereby jailbreak it). Jailbreaks based on checkm8 are semi-tethered jailbreaks as the exploit works by taking advantage of a heap overflow in the USB DFU stack.
ipwndfu and checkra1n are currently the main tools capable of using the checkm8 exploit.