{"id":29041,"date":"2020-05-25T15:16:16","date_gmt":"2020-05-25T19:16:16","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=29041"},"modified":"2020-07-09T15:47:47","modified_gmt":"2020-07-09T19:47:47","slug":"unc0ver-jailbreak-tool-for-ios-13-5","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2020\/05\/25\/unc0ver-jailbreak-tool-for-ios-13-5\/","title":{"rendered":"unc0ver Jailbreak Tool for iOS 13.5"},"content":{"rendered":"<p><a href=\"https:\/\/www.macrumors.com\/2020\/05\/24\/unc0ver-jailbreak-ios-13-5-compatibility-released\/\">Frank McShan<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=23287364\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.macrumors.com\/2020\/05\/24\/unc0ver-jailbreak-ios-13-5-compatibility-released\/\"><p>The team behind the &ldquo;unc0ver&rdquo; jailbreaking tool for iOS has released version 5.0.0 of its software that claims to have the ability to jailbreak &ldquo;every signed iOS version on every device&rdquo; using a zero-day kernel vulnerability by Pwn20wnd, a renowned iOS hacker.<\/p><p>[&#8230;]<\/p><p>As for security, unc0ver&rsquo;s website says it utilizes &ldquo;native system sandbox exceptions&rdquo; so that &ldquo;security remains intact while enabling access to jailbreak files.&rdquo;<\/p><\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/05\/21\/ios-13-5\/\">iOS 13.5<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/05\/19\/apple-vs-security-researchers\/\">Apple vs. Security Researchers<\/a><\/li>\n<\/ul>\n\n<p id=\"unc0ver-jailbreak-tool-for-ios-13-5-update-2020-07-09\">Update (2020-07-09): <a href=\"https:\/\/googleprojectzero.blogspot.com\/2020\/07\/how-to-unc0ver-0-day-in-4-hours-or-less.html\">Brandon Azad<\/a> (<a href=\"https:\/\/twitter.com\/_bazad\/status\/1281257978616664066\">tweet<\/a>, <a href=\"https:\/\/news.ycombinator.com\/item?id=23781690\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/googleprojectzero.blogspot.com\/2020\/07\/how-to-unc0ver-0-day-in-4-hours-or-less.html\"><p>At 3 PM PDT on May 23, 2020, the unc0ver jailbreak was <a href=\"https:\/\/github.com\/pwn20wndstuff\/Undecimus\/releases\/tag\/v5.0.0\">released<\/a> for iOS 13.5 (the latest signed version at the time of release) using a zero-day vulnerability and heavy obfuscation. By 7 PM, I had identified the vulnerability and informed Apple. By 1 AM, I had sent Apple a POC and my analysis. This post takes you along that journey.<\/p><\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Frank McShan (Hacker News): The team behind the &ldquo;unc0ver&rdquo; jailbreaking tool for iOS has released version 5.0.0 of its software that claims to have the ability to jailbreak &ldquo;every signed iOS version on every device&rdquo; using a zero-day kernel vulnerability by Pwn20wnd, a renowned iOS hacker.[&#8230;]As for security, unc0ver&rsquo;s website says it utilizes &ldquo;native system [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2020-05-25T19:16:18Z","apple_news_api_id":"46284f13-9a28-433c-8ea4-2f0c0f7a3824","apple_news_api_modified_at":"2020-07-09T19:47:50Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAA==","apple_news_api_share_url":"https:\/\/apple.news\/ARihPE5ooQzyOpC8MD3o4JA","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[31,1667,688,53,48],"class_list":["post-29041","post","type-post","status-publish","format-standard","hentry","category-technology","tag-ios","tag-ios-13","tag-jailbreak","tag-sandboxing","tag-security"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/29041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=29041"}],"version-history":[{"count":2,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/29041\/revisions"}],"predecessor-version":[{"id":29461,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/29041\/revisions\/29461"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=29041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=29041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=29041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}