ICLOUDJAILBREAK

Untethered 14.5.1 Jailbreak on iPhone 12 Pro demoed.

Untethered 14.5.1 Jailbreak on iPhone 12 Pro demoed.

Untethered 14.5.1 Jailbreak for iPhone 12 Pro demoed.

Untethered 14.5.1 Jailbreak  Demo of CVE-2021-30740, CVE-2021-30768, CVE-2021-30769, CVE-2021-30770 and CVE-2021-30773 on iOS 14.5.1, iPhone 12 Pro Max.

iPhone 12 Pro demoed Untethered 14.5.1 Jailbreak

Jailbreak  In the last few years, the vast majority of jailbreaks are partially untethered. Those who remain jailbroken after a reboot are a major pain to jailbreakers for all time, anyone could remember. That’s why an update from @LinusHenze Monday morning could be of interest to you in particular. Many vulnerabilities in the kernel, as well as other vulnerabilities, were eliminated within iOS 14.6 or 14.7,

Linus is showing them off for iPhone 12 Pro Max version 14.5.1 The jailbreak isn’t tied, but of course, we’re not expecting that it will be released to the public However, it’s nice to see an untethered jailbreak demo once more.

Untethered 14.5.1 Jailbreak on iPhone 12 Pro demoed.

iPhone 12 Pro Max with iOS 14.5.1 untethered jailbreak Linus Henze demonstrate

 

These jailbreaks were largely untethered over the past few decades. This means you can use your phone after being hacked with these tools, even if it is not jailbroken.

 

The absence of untethered jailbreaks — or ones that are fully jailbroken even after reboots — has been a problem for jailbreakers since the time anyone remembers. This is why an account on Twitter by @LinusHenze Monday afternoon could be particularly interesting…

 

Checkn1x 1.1.3 Patch 0.12.0 – iOS 14* (A10/A10X/A11) on Windows

 

The tweet, accompanied by a short video that appears to show the jailbreak without tethering on iPhone 12 Pro Max running iOS 14.5.1 which makes use of some vulnerabilities:

 

On the screen, Henze starts the phone with no cables connected and instantly shows the version of firmware installed as well as the hardware model. After that, Henze shows off a functioning Sileo packages manager.

 

Based on the tweet Based on the Tweet, we can determine that the exploits utilized are CVE-2021-30770, CVE-2021-30770, CVE-2021-30 The exploits include CVE-2021-30770, CVE-2021-30770, as.

 

CVE-2021-30740 was fixed in iOS and iPadOS 11.6, and all four other vulnerabilities mentioned above were also fixed with iOS 14.7 and iOS 14.6. iOS and iPadOS14.6 could be the lowest common denominator. This would mean that untethering will not work on iOS or iPadOS 14.5.1 unless a kernel exploit can be used to replace it.

Henze is a reliable resource for iPhone security research and has published vulnerabilities before. It is yet to be determined if Henze will make available this untether or any other documentation which could aid in creating one for the standard jailbreaker.

 

It’s incredible to realize that this kind of jailbreak can still be done despite the numerous software protections that Apple praises with each update.

 

Is this a sign that you believe that we’ll see a jailbreak that isn’t tied to a network in the near future? Let us know what you think in the comment section below.

 

Demo of CVE-2021-30740, CVE-2021-30768, CVE-2021-30769, CVE-2021-30770 and CVE-2021-30773 on iOS 14.5.1, iPhone 12 Pro Max pic.twitter.com/k2df20E9yU

— Linus Henze (@LinusHenze) September 13, 2021

Leave a Reply

Back to top button