Researcher published a PoC exploit code for critical vulnerabilities that could be chained to implement an iOS jailbreak On iPhone X
The security researcher Qixun Zhao of Qihoo 360’s Vulcan Team has published a PoC exploit code for critical vulnerabilities in Apple Safari web browser and iOS that could be exploited by a remote attacker to jailbreak an iPhoneX running iOS 12.1.2 and early versions.
The exploitation of the flaw is quite simple, the attacker needs to trick victims into opening a specially crafted web page using Safari browser.
The PoC code developed by Qixun Zhao, dubbed Chaos, chains two security flaws that were demonstrated at TianfuCup hacking contest in November.
The Chaos exploit code triggers a couple of vulnerabilities, a type confusion memory corruption flaw in Apple’s Safari WebKit (CVE-2019-6227) and a use-after-free memory corruption bug (CVE-2019-6225) in iOS Kernel. Apple addressed the flaws by releasing the iOS version 12.1.3.
The Safari vulnerability allowed maliciously crafted web content to execute arbitrary code on the targeted device, which then the second one allowed to elevate privileges and silently deploy a malicious application
Zhao published a blog post that includes some details for the exploit code, the expert also shared a PoC video demonstration for it.
Zhao hasn’t published the exploit code for the iOS jailbreak to prevent attacks in the wild.
“I will not release the exploit code, if you want to jailbreak, you will need to complete the exploit code yourself or wait for the jailbreak community’s release. At the same time, I will not mention the exploit details of the post exploit, as this is handled by the jailbreak community,” Zhao said.
iPhone users urge to install the latest iOS update as soon as possible,