Google has found an iOS exploit that can lead to first iOS 11 jailbreak. The announcement of the exploit has been widely discussed by the developer community and now the kernel vulnerability has been made public.
Ian Beer, a security research engineer at Google’s Project Zero claimed that he would soon share one of the iOS exploits with potential for first iOS 11 jailbreak. Google’s Project Zero found an exploit named async_wake that gives complete control of the core of the operating system.
Interestingly, Beer has now revealed that exploit affects ‘tfp0’ which basically stands for kernel task port in iOS. The exploit would work on all 64-bit devices and developers can take control of the operating system.
Apple immediately pushed out security patches addressing the flaw as part of iOS 11.2. While the exploit won’t work on iPhones running updated software, but those running older versions are at risk. The exploit allows researchers to bypass software restrictions imposed by Apple, but does not allow for jailbreak.
Jailbreaking iPhones was popular when Apple launched the first iPhone in 2007 without an App Store. However, it popularity has declined both from the user and developer perspective in the past few years. The exploit highlighted by Ian Beer served as an entry point for developers to jailbreak iOS and get rid of restrictions imposed by Apple.
As noted by ZDNet, researchers at Team Pangu claim that they discovered the same flaw last year and have been using it as a tool for jailbreaking an iPhone. However, they now stand at a huge loss since Apple has patched the vulnerability with the release of iOS 11.2.
Researchers say the exploit allowed to jailbreak iPhone 7, iPhone 6s and sixth generation iPod Touch till the time they are running iOS 11.1.2. The exploit has also been tested on a MacBook Air running macOS 10.13. The exploit revealed by Beer has in a way helped Apple secure a lot of iOS users.