Difference between revisions of "Bootrom"

From The iPhone Wiki
Jump to: navigation, search
(S5L8720, used in the iPod touch 2G)
m (T7000, used in the iPhone 6, iPhone 6 Plus and iPod touch 6G)
(47 intermediate revisions by 10 users not shown)
Line 1: Line 1:
  +
The '''bootrom''' (called "SecureROM" by Apple) is the first significant code that runs on an iDevice. The bootrom is read-only. Finding exploits in the bootrom level is a big achievement since Apple won't be able to fix it without a hardware revision.
==Introduction / old+new==
 
The bootrom (called "SecureROM" by Apple) is the first significant code that runs on an iDevice. The bootrom is read-only. Finding exploits in the bootrom level is a big achievement since Apple won't be able to fix it without a hardware revision.
 
   
  +
== Old & New bootrom ==
 
Certain models, including the [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]], have different bootrom versions. These are most commonly referred to with the terms "old bootrom" and "new bootrom." These "new bootrom" devices were released after [[Timeline#September|9 September 2009]] and have the [[0x24000 Segment Overflow]] fixed. While the new bootrom revisions have an exploit, the exploit needs the assistance of a firmware-based exploit to achieve an [[untethered jailbreak]].
 
Certain models, including the [[N72ap|iPod touch 2G]] and [[N88ap|iPhone 3GS]], have different bootrom versions. These are most commonly referred to with the terms "old bootrom" and "new bootrom." These "new bootrom" devices were released after [[Timeline#September|9 September 2009]] and have the [[0x24000 Segment Overflow]] fixed. While the new bootrom revisions have an exploit, the exploit needs the assistance of a firmware-based exploit to achieve an [[untethered jailbreak]].
   
 
You might also be looking for [[iBoot (Bootloader)|Apple's stage 2 bootloader]], which also uses the "iBoot" name.
 
You might also be looking for [[iBoot (Bootloader)|Apple's stage 2 bootloader]], which also uses the "iBoot" name.
  +
  +
Usually also looking at the CPRV (Chip Revision) tag will also tell you whether the device is new unit or not also.
   
 
==Finding bootrom version==
 
==Finding bootrom version==
Line 11: Line 13:
   
 
===From the serial number ([[n88ap|iPhone 3GS]])===
 
===From the serial number ([[n88ap|iPhone 3GS]])===
The third digit of the serial number identifies the year of manufacture (9=2009, 0=2010), while the fourth and the fifth indicate the week. The first "new bootrom" devices are from week 40 of 2009 (??940?????? or higher serials). Any iPhone made after Week 45 of 2009 (??945?????? and higher or ??0???????? serials) has the new bootrom.
+
The third digit of the serial number identifies the year of manufacture (9=2009, 0=2010, 1=2011, 2=2012), while the fourth and the fifth indicate the week. There is a gray area between week 40 of 2009 (??940??????) and week 45 of 2009 (??945??????) where some devices have new bootrom whilst others have old bootrom. . Any iPhone made after Week 45 of 2009 (??945?????? and higher or ??0???????? serials) has the new bootrom.
   
===From the DFU Device descriptors (All devices)===
+
===From the DFU Device descriptors (all devices except S5L8900)===
 
====Windows====
 
====Windows====
 
# Connect Device & Enter [[DFU Mode]]
 
# Connect Device & Enter [[DFU Mode]]
Line 33: Line 35:
   
 
== Dumping the bootrom ==
 
== Dumping the bootrom ==
You can use [[Bootrom Dumper Utility]] by [[User:pod2g|pod2g]] to dump the bootrom on devices that are vulnerable to the [[limera1n]] exploit.
+
You can use [[Bootrom Dumper Utility]] by [[User:pod2g|pod2g]] to dump the bootrom on devices that are vulnerable to the [[Limera1n Exploit]].
  +
  +
== Bootrom Exploits ==
  +
* [[pwnage|Pwnage 1.0 (Ramdisk + AppleImage2NORAccess)]] up to Rev.2
  +
* [[Pwnage 2.0|Pwnage 2.0 (DFU + Malformed Certificate)]] up to Rev.2
  +
* [[0x24000 Segment Overflow]] up to 240.4/359.3
  +
* [[usb_control_msg(0xA1, 1) Exploit]] (also called "steaks4uce" exploit) only for 240.4 and 240.5.1
  +
* [[Limera1n Exploit]] up to 574.4
  +
* [[SHA-1 Image Segment Overflow|SHAtter]] up to 574.4
   
 
== Revisions ==
 
== Revisions ==
  +
* [[Bootrom Rev.2]] in [[S5L8900]]
===[[S5L8720]], used in the [[N72ap|iPod touch 2G]]===
 
* [[iBoot-240.4]] "old bootrom"
+
* [[Bootrom 240.4]] in [[S5L8720]] (old version only)
  +
* [[Bootrom 359.3]] in [[S5L8920]] (old version only)
* [[iBoot-240.5.1]] "new bootrom"
 
  +
* [[Bootrom 240.5.1]] in [[S5L8720]] (new version only)
  +
* [[Bootrom 359.3.2]] in [[S5L8920]] (new version only)
  +
* [[Bootrom 359.5]] in [[S5L8922]]
  +
* [[Bootrom 574.4]] in [[S5L8930]]
  +
* [[Bootrom 838.3]] in [[S5L8940]]
  +
* Bootrom ???.? in [[S5L8942]]
  +
* [[Bootrom 1062.2]] in [[S5L8945]]
  +
* Bootrom 1???.? in [[S5L8947]]
  +
* [[Bootrom 1145.3]] in [[S5L8950]]
  +
* [[Bootrom 1145.3.3]] in [[S5L8955]]
  +
* [[Bootrom 1704.10]] in [[S5L8960]] and [[S5L8965]]
  +
* [[Bootrom 1992.0.0.1.19]] in [[T7000]]
  +
* unknown [[T7001]]
  +
* unknown [[S1]]
  +
  +
===[[S5L8900]], used in the [[m68ap|iPhone]], [[n45ap|iPod touch]], and [[n82ap|iPhone 3G]]===
  +
see also [[VROM (S5L8900)]]
  +
* [[Bootrom Rev.2]]
  +
  +
===[[S5L8720]], used in the [[n72ap|iPod touch 2G]]===
  +
* [[Bootrom 240.4]] "old bootrom"
  +
* [[Bootrom 240.5.1]] "new bootrom"
  +
  +
===[[S5L8920]], used in the [[n88ap|iPhone 3GS]]===
  +
* [[Bootrom 359.3]] "old bootrom"
  +
* [[Bootrom 359.3.2]] "new bootrom"
  +
  +
===[[S5L8922]], used in the [[n18ap|iPod touch 3G]]===
  +
* [[Bootrom 359.5]]
  +
  +
===[[S5L8930]], used in the [[k48ap|iPad]], [[n90ap|iPhone 4]], [[k66ap|Apple TV 2G]] and [[n81ap|iPod touch 4G]]===
  +
* [[Bootrom 574.4]]
  +
  +
===[[S5L8940]], used in the [[iPad 2]] and [[n94ap|iPhone 4S]]===
  +
* [[Bootrom 838.3]]
  +
  +
===[[S5L8942]], used in the [[k93aap|iPad 2 (iPad2,4)]], [[j33ap|Apple TV 3G (AppleTV3,1)]], [[iPod touch 5G]], [[iPad mini 1G]] ===
  +
* not reported, unknown
  +
<!--
  +
* Apple TV 3G (j33) does not print Bootrom revision over USB Descriptor while in DFU.
  +
  +
e.g CPID:8942_CPRV:10_CPFM:03_SCEP:10_BDID:08_ECID:00000XXXXXXXXXXX_IBFL:00_SRTG:[ROM]
  +
-->
  +
  +
===[[S5L8945]], used in the [[iPad 3]]===
  +
* [[Bootrom 1062.2]]
  +
  +
===[[S5L8947]], used in the [[j33iap|Apple TV 3G (AppleTV3,2)]]===
  +
* unknown
  +
  +
===[[S5L8950]], used in the [[iPhone 5]] and [[iPhone 5c]] ===
  +
* [[Bootrom 1145.3]]
  +
  +
===[[S5L8955]], used in the [[iPad 4]]===
  +
* [[Bootrom 1145.3.3]]
  +
  +
===[[S5L8960]]/[[S5L8965]], used in the [[iPhone 5s]], [[iPad Air]], and [[iPad mini 2]]===
  +
* [[Bootrom 1704.10]]
   
===[[S5L8900]], used in the [[N82ap|iPhone 3G]]===
+
===[[T7000]], used in the [[n61ap|iPhone 6]], [[n56ap|iPhone 6 Plus]] and [[n102ap|iPod touch 6G]]===
* [[iBoot-596.24]]
+
* [[Bootrom 1992.0.0.1.19]]
   
===[[S5L8920]], used in the [[N88ap|iPhone 3GS]]===
+
===[[T7001]], used in the [[iPad Air 2]] ===
  +
* unknown
* [[iBoot-359.3]] "old bootrom"
 
* [[iBoot-359.3.2]] "new bootrom"
 
   
===[[S5L8922]], used in the [[N18ap|iPod touch 3G]]===
+
===[[S1]], used in the [[Apple Watch]]===
  +
* unknown
* [[iBoot-359.5]]
 
   
  +
== References ==
===[[S5L8930]], used in the [[K48ap|iPad]], [[N90ap|iPhone 4]], [[K66ap|Apple TV 2G]] and [[N81ap|iPod touch 4G]]===
 
  +
* [http://conference.hitb.org/hitbsecconf2013kul/materials/D2T1%20-%20Joshua%20'p0sixninja'%20Hill%20-%20SHAttered%20Dreams.pdf p0sixninja's presentation SHAttered Dreams - Adventures in BootROM Land]
* [[iBoot-574.4]]
 
   
  +
[[Category:Bootrom]]
===[[S5L8940]], used in the [[iPad 2]] and [[N94ap|iPhone 4S]]===
 
* [[iBoot-838.3]]
 

Revision as of 17:56, 15 July 2015

The bootrom (called "SecureROM" by Apple) is the first significant code that runs on an iDevice. The bootrom is read-only. Finding exploits in the bootrom level is a big achievement since Apple won't be able to fix it without a hardware revision.

Old & New bootrom

Certain models, including the iPod touch 2G and iPhone 3GS, have different bootrom versions. These are most commonly referred to with the terms "old bootrom" and "new bootrom." These "new bootrom" devices were released after 9 September 2009 and have the 0x24000 Segment Overflow fixed. While the new bootrom revisions have an exploit, the exploit needs the assistance of a firmware-based exploit to achieve an untethered jailbreak.

You might also be looking for Apple's stage 2 bootloader, which also uses the "iBoot" name.

Usually also looking at the CPRV (Chip Revision) tag will also tell you whether the device is new unit or not also.

Finding bootrom version

From the model number (iPod touch 2G)

If the second character of your Model Number is "B" (e.g.- FB533, MB533, or PB533), your iPod has the old bootrom. If the second character is "C" (FC086, MC086 or PC086), your iPod has the new bootrom.

From the serial number (iPhone 3GS)

The third digit of the serial number identifies the year of manufacture (9=2009, 0=2010, 1=2011, 2=2012), while the fourth and the fifth indicate the week. There is a gray area between week 40 of 2009 (??940??????) and week 45 of 2009 (??945??????) where some devices have new bootrom whilst others have old bootrom. . Any iPhone made after Week 45 of 2009 (??945?????? and higher or ??0???????? serials) has the new bootrom.

From the DFU Device descriptors (all devices except S5L8900)

Windows

  1. Connect Device & Enter DFU Mode
  2. Open Device Manager, find USB controller, subitem Apple Mobile Device USB Driver
  3. Right-Click & click Properties
  4. Go to Details tab & select Device Instance Path in the dropdown box
  5. The end of the info string will show the bootrom version

Mac OS X

  1. Connect Device & Enter DFU Mode
  2. Go to System Profiler, and under the Hardware category, go to USB, and click on Apple Mobile Device (DFU Mode)
  3. The end of the Serial Number string will show the bootrom version in brackets (ie: [iBoot-574.4])

Linux

  1. Make sure your distribution has usbutils installed. (most distributions have it by default)
  2. Connect Device & Enter DFU Mode
  3. In terminal, run sudo lsusb -v
  4. Find the line that says iSerial and your bootrom version will be at the end of the line.

Dumping the bootrom

You can use Bootrom Dumper Utility by pod2g to dump the bootrom on devices that are vulnerable to the Limera1n Exploit.

Bootrom Exploits

Revisions

S5L8900, used in the iPhone, iPod touch, and iPhone 3G

see also VROM (S5L8900)

S5L8720, used in the iPod touch 2G

S5L8920, used in the iPhone 3GS

S5L8922, used in the iPod touch 3G

S5L8930, used in the iPad, iPhone 4, Apple TV 2G and iPod touch 4G

S5L8940, used in the iPad 2 and iPhone 4S

S5L8942, used in the iPad 2 (iPad2,4), Apple TV 3G (AppleTV3,1), iPod touch 5G, iPad mini 1G

  • not reported, unknown

S5L8945, used in the iPad 3

S5L8947, used in the Apple TV 3G (AppleTV3,2)

  • unknown

S5L8950, used in the iPhone 5 and iPhone 5c

S5L8955, used in the iPad 4

S5L8960/S5L8965, used in the iPhone 5s, iPad Air, and iPad mini 2

T7000, used in the iPhone 6, iPhone 6 Plus and iPod touch 6G

T7001, used in the iPad Air 2

  • unknown

S1, used in the Apple Watch

  • unknown

References