
It was a rare admission that the iPhone was under active attack by hackers, but the company declined to say who the hackers were and who they were targeting. We wrote our own exploit based on CVE-2021-1782 for #unc0ver to achieve optimal exploit speed and stability.Īpple fixed the vulnerability in iOS 14.4, released last month, which also prevents the jailbreak from working on later versions. By targeting the kernel, the hackers are able to get deep hooks into the underlying operating system. In a tweet, the jailbreak group said it used its “own exploit” for CVE-2021-1782, a kernel vulnerability that Apple said was one of three flaws that “may have been actively exploited” by hackers. Hackers build jailbreak tools by finding and exploiting vulnerabilities that can lift some of the restrictions that Apple puts in place, like installing apps outside of its app store, which most Android users are already used to. Jailbreaking is a cat-and-mouse game between security researchers who want greater control and customizations over their phones, and Apple, which says it locks down iPhones for security.

The Unc0ver team released its latest jailbreak this weekend, and says it works on iOS 11 (iPhone 5s and later) to iOS 14.3, which Apple released in December.

An iPhone hacking team has released a new jailbreak tool for almost every iPhone, including the most recent models, by using the same vulnerability that Apple last month said was under active attack by hackers.
