0:00
what's going on YouTube GSN right here
0:02
so in today's video we're discussing
0:03
about iOS 18.2.1 which was released by
0:06
Apple today we're going to take a look
0:08
at whether this is good for jailbreak
0:09
purposes and what you should do whether
0:11
you should keep waiting on iOS 18.2 or
0:14
lower or whether you can update this
0:15
video is brought to you by 10 share rot
0:17
a software that allows you to easily fix
0:18
your device if it's stuck in recovery
0:20
mode dfu mode Apple logo and so on
0:22
definitely check the program out in the
0:24
link below so today Apple released iOS
0:26
18.2.1 and iPad OS 18.2.1 this this
0:30
doesn't have any cve published at the
0:32
moment so there are no vulnerabilities
0:34
that have been published and there is no
0:35
security content for iOS 18.2.1 which
0:38
hints to the fact that the security
0:40
content of it is the same as the iOS
0:43
18.2 so for now unless Apple publishes
0:46
more information about the security
0:48
content for this release it should be
0:49
safe to assume that if you go from IOS
0:51
18.2 to iOS 18.2.1 there shouldn't be
0:55
any change in your chance Jailbreak in
0:57
the future however if you take a look
0:59
here at the iOS 18.2 this is where
1:01
things get a little bit more complicated
1:03
there are several vulnerabilities that
1:05
have been patched on iOS 18.2 that are
1:07
available on previous versions that
1:09
could potentially be useful for
1:11
jailbreak purposes first we have a
1:12
couple of Apple mobile file Integrity or
1:14
a vulnerabilities m is usually targeted
1:17
in a jelbreak because this is what
1:19
handles the code signing but in this
1:21
case it just leaks private information
1:23
apparently and sensitive data so not
1:25
exactly a great thing that we could use
1:26
for jelbreak purposes however more
1:28
important are a pair of vulnerabilities
1:31
these two over here this pair is
1:33
actually quite interesting for
1:34
vulnerability says an app may be able to
1:36
break out of its sendbox potentially
1:38
leading to um nugget like application
1:41
maybe if it can write to files that it
1:43
doesn't have access to and then we have
1:45
another vulnerability in the same
1:47
component and this one says an app may
1:49
be able to gain elevated privileges if
1:51
you combine these two vulnerabilities
1:53
over here you might be able to get
1:54
elevated privileges possibly route and
1:56
then you can also break out of the
1:58
sandbox potentially being a able to
2:00
create a powerful customization app just
2:02
based on this right now we don't have
2:04
any releases for these vulnerabilities
2:06
however as time passes we might be able
2:08
to see them in the wild the rest of the
2:10
vulnerabilities here in the security
2:12
content are kind of weak for jailbreak
2:14
purposes they just leak sensitive user
2:16
data or sensitive memory but not exactly
2:19
useful for jailbreak purposes however
2:21
these two vulnerabilities over here
2:23
potentially this one over here as well
2:25
could be used if exploited for
2:27
customization or possibly a semi
2:29
jailbreak type of application now what I
2:31
would recommend if you do not need the
2:34
bug fixes of iOS 18.2.1 if you're
2:37
running a previous version especially
2:39
below 18.2 I would highly recommend you
2:42
stay below 18.2 because these
2:44
vulnerabilities in here could prove
2:45
useful and by now a lot of time has
2:48
passed since iOS say 18.1 was released
2:51
so we might start seeing this kind of
2:53
vulnerabilities in the wild for those of
2:55
you who are interested in delay otaa
2:57
I've also updated my article on delay
2:59
OTA profiles probably know this is used
3:01
for updating to an unsigned iOS version
3:05
long after it was unsigned and the table
3:07
is now reflecting the latest changes so
3:09
you have 18.2.1 which is the current
3:11
release and then you have the 18.2 which
3:13
will expire in April the closest one
3:15
that will expire is IOS
3:17
18.01 which will expire on the 26th of
3:21
January 2025 so quite soon and the iOS
3:25
18.0 the delay OTA profile has
3:27
officially expired so it's not longer
3:30
possible to delay ot8 iOS 18.0 anyway if
3:33
you stay below iOS 18.2 that's probably
3:36
going to be good in the long term
3:37
because you might have access to this
3:39
kind of vulnerabilities and everything
3:41
below so that would be great I wouldn't
3:43
update the 18.2.1 at the moment there
3:46
isn't really much of a thing patched as
3:48
far as I can see but you might lose
3:51
these vulnerabilities that could turn up
3:52
to be useful so that's basically thank
3:54
you for watching I GSN peace out