Is The Message

A new vulnerability was discovered on iPhone models

A new vulnerability was discovered on iPhone models

With the iOS 13 version, Apple did not fall off the agenda due to some errors, and this time it came up with a hardware deficit. With this vulnerability, JailBreak researchers have been recognized that millions of devices have been affected, he said.

Millions of Apple devices are hackable

Thanks to the vulnerability discovered by the security researcher named axi0mX, all devices manufactured between 2011-2017 are affected by this vulnerability. A security researcher called checkm8 said Apple could not fix this vulnerability with any updates in the future. Launched as one of the biggest security events in the history of Apple security, with this vulnerability, iPhone XS, iPhone XR, iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max, all devices can be made JailBreak.

Using an exploit called BootROM, this vulnerability exploits code that runs during boot, giving access to the device. Since the devices can be hacked using ROM (Read Only Memory), the firm will not be able to close the gap with any updates. The security weakness that researchers have mentioned is the first BootROM-level vulnerability released since the iPhone 4, which was released almost 10 years ago.

This publicly released vulnerability does not allow users to expect a new release of JailBreak. The use of BootROM vulnerabilities on older devices makes iOS devices better for everyone. JailBreak and Tweak developers can easily hack the latest versions of devices. Devices with older versions will now be updated to provide JailBreak.

Unfortunately, this vulnerability does not exist in A12 processors, affecting all processors that are searched, including A5 and A11 processors. The JailBreak version, which has become available with this description, has not yet been released. However, the researchers stated that they are working to publish as soon as possible. For the time being, users who want to make JailBreak on their phones using this vulnerability can only do so with a USB cable.

0 0 vote
Article Rating
Notify of
Inline Feedbacks
View all comments
If you have any copyright issues, just mail us. is the message
Would love your thoughts, please comment.x