0:00
what's going on YouTube GSN right here
0:02
so in today's video I have great news
0:03
for those of you interested in iOS 17
0:06
Jailbreak on newer devices a brand new
0:08
proof of concept for Cal vulnerability
0:10
has been released we're going to get
0:12
into that in a second this video is
0:13
brought to you by for me key a software
0:15
that allows you to remove the activation
0:16
lock from devices that you bought
0:17
secondhand if it's an iPhone 10 or older
0:20
if it turned out locked and you were
0:21
scammed on Facebook groups or eBay and
0:23
stuff like that it supports iOS 15 and
0:26
16 you can also turn off the camera
0:27
sound there's a free trial available for
0:29
both Windows and Mac OS it supports up
0:31
to iOS 16.7 and there's also a 20% off
0:34
coupon available down below definitely
0:37
check the program Out Below So Yesterday
0:39
out of the blue we got this in here cve
0:43
23208 and this one is a kernel
0:46
vulnerability and it's a proof of
0:48
concept for a kernel vulnerability it
0:50
says in here it's for Mac OS 14.0 up to
0:53
14.2.1 but what is more important iOS
0:55
17.0 up to 17.21 and if you go ahead
0:59
here on my website on ivice central.com
1:01
on iOS signing status you can see that
1:03
the latest version is IOS 17.3 at the
1:06
moment which is signed but then iOS
1:08
1.2.1 is exactly the previous version so
1:11
this is for a very very recent iOS
1:13
version range however this is not an
1:15
exploit is a proof of concept a PC so a
1:18
proof of concept essentially means that
1:19
the vulnerability can likely be
1:21
exploited in the future if you write an
1:23
exploit for it you would be able to
1:24
trigger the vulnerability and use it for
1:26
jailbreak purposes maybe or whatever you
1:28
want to do with it but it's not the
1:29
exploit itself just a code to trigger
1:31
the vulnerability to prove that is there
1:34
so somebody still needs to take this
1:35
code to take this vulnerability and make
1:37
a proper exploit for it this is just one
1:39
of the steps so if you go inside this
1:40
folder over here it does say this here
1:42
is a proof of concept only can be
1:44
triggered from 14.0 to 14.2.1 on Mac OS
1:47
we can achieve a similar effect to fork
1:49
for updating last pit on iOS by using
1:51
the message send function in conjunction
1:54
with SCM wres method to pass the file
1:56
descriptor from one application to
1:58
another kind of convoluted but they they
1:59
do provide the whole coding here the
2:01
trigger the vulnerability now this per
2:03
se cannot be used for jailbreak purposes
2:05
this is just a trigger the vulnerability
2:07
and prove that it is indeed there still
2:10
a developer skilled enough can take this
2:12
vulnerability and do the proper research
2:14
to write an exploit and possibly
2:16
exploited for jailbreak purposes so it's
2:18
a good idea to not update the iOS 17.3
2:21
because this one does patch the
2:23
vulnerability iOS 17.21 and lower is
2:26
what supports this vulnerability however
2:28
you should not update at all do not
2:30
update if you're running a lower version
2:32
do not do OTA delay or stuff like that
2:35
if you're running an older version
2:37
particularly iOS 16 something no matter
2:39
what device you're on it's a good idea
2:41
to stay on iOS 16 iOS 17 if you're
2:44
running an older version that's great
2:46
that's better if you're running a newer
2:47
version it's still good just don't
2:49
update iOS 17.3 and just don't update in
2:52
general the usual adage in the community
2:55
is do not update if you don't have to
2:57
usually the lower the better it may not
2:59
be the case all the times but history
3:02
shows that usually staying on an older
3:04
version is actually better so yes there
3:06
you have it a brand new Colonel
3:07
vulnerability working for iOS 17.0 up to
3:11
17.21 proof of concept released no
3:13
exploit yet I'm going to keep you
3:14
updated if we do get an exploit in the
3:16
near future ex so thank you for watching
3:17
I am GS snow till the next time peace