<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Saagarjha</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Saagarjha"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Saagarjha"/>
	<updated>2026-05-21T09:55:40Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Checkm8_Exploit&amp;diff=117982</id>
		<title>Checkm8 Exploit</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Checkm8_Exploit&amp;diff=117982"/>
		<updated>2021-09-26T06:35:41Z</updated>

		<summary type="html">&lt;p&gt;Saagarjha: checkm8 is a use-after-free, not a heap overflow&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{lowercase}}&lt;br /&gt;
The '''checkm8 exploit''' is a [[bootrom]] exploit with a CVE ID of CVE-2019-8900 used to run unsigned code on iOS, iPadOS, tvOS, watchOS, bridgeOS, audioOS, and Haywire devices with processors between an A5 and an A11, a S1P and a S3, a S5L8747, and a T2 (and thereby [[jailbreak]] it). Jailbreaks based on checkm8 are [[semi-tethered jailbreak]]s as the exploit works by taking advantage of a use-after-free in the USB DFU stack.&lt;br /&gt;
&lt;br /&gt;
[[ipwndfu]] and [[checkra1n]] are currently the main tools capable of using the checkm8 exploit. &lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [https://habr.com/en/company/dsec/blog/472762/ Technical analysis of the checkm8 exploit]&lt;br /&gt;
* [https://www.kb.cert.org/vuls/id/941987/ Apple devices vulnerable to arbitrary code execution in SecureROM]&lt;br /&gt;
* [https://news.ycombinator.com/item?id=22849837 https://news.ycombinator.com/item?id=22849837]&lt;br /&gt;
* [https://arstechnica.com/information-technology/2019/09/developer-of-checkm8-explains-why-idevice-jailbreak-exploit-is-a-game-changer Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Exploits]]&lt;br /&gt;
[[Category:Bootrom Exploits]]&lt;/div&gt;</summary>
		<author><name>Saagarjha</name></author>
		
	</entry>
</feed>