0:00
What's going on YouTube? Geosner Right here
0:02
Welcome to Idaho Central Channel. In today's video, I have some good news for those of you waiting for a Jill brick on iOS 16.5
0:08
And, it looks like Apple patched a couple of exploits or at least some vulnerabilities in the newest version in 16.5.1
0:15
And those vulnerabilities might get released and could be usable for a jail brick
0:19
This video is brought to you by PassFav Activation Unlock, a software that allows you to unlock your device
0:23
If you forgot your password and Apple ID for your device, or you accidentally set those, or maybe you created an account that is a
0:29
throwaway for applications you don't remember the password anymore if your device is locked in any way or it's
0:35
unable to activate and it says could not activate or activation error this could definitely help you
0:40
fix the device definitely check the program out in the link below it does support windows as well as
0:45
macOS and a free trial is available to get the windows version you're pressing here and that's about it
0:50
you currently have a promotion as well so definitely check it out you should know that this does
0:55
support iPhones and iPads as well so if you have a tablet this does support it
1:00
So definitely check it out below. A couple of days ago Apple released iOS 16 and iPadOS 16 With this release we have only two vulnerabilities patched a kernel vulnerability and a WebKit vulnerability by the looks of it
1:13
The CVE 2020332-434. This one is a kernel vulnerability and it appears to be quite powerful
1:19
The description provided by Apple is a bit vague. It says an integer overflow was addressed with improved input validation
1:26
It doesn't mean much. The impact is a little bit bigger. It says an application may be able to execute arbitrary code with kernel
1:31
privileges. And Apple is aware of a report that this issue may have been actively exploited
1:36
against versions of iOS released before 15.7. Now this vulnerability seems to have been patched in
1:41
16.5.1, so it could be that the vulnerability works on iOS 16.5 and lower, but they know that
1:48
it's been used on iOS 15.7 and lower, because this is part of a malware that was
1:53
circulating around since 2019. The malware itself could actually exfiltrate files and whatever
1:59
So this was part of a targeted attack at some point, and now Apple did patch them
2:04
But fortunately, this could be usable for Jillberg as well. A kernel vulnerability capable to run arbitrary code is definitely powerful enough And if they did use it for malware purposes it could be possible that it powerful enough for jailbreak as well and then we have a web kit vulnerability so basically safari and this one is also pretty powerful it says processing maliciously
2:22
crafted web content may lead to arbitrary code execution this was also used in the same attack so yeah
2:28
quite interesting in here the hacker news publication over here posted this article in which they
2:32
detail the two vulnerabilities and how they were used and according to them they say in here quote this
2:38
a pair of zero days that have been weaponized in a mobile surveillance campaign called
2:42
Operation Triagulation. This has been active since 2019. The exact threat actor behind the activity is not known
2:48
But it's actually mentioned that these two vulnerabilities patched by Apple were actually
2:52
included in that. So apparently it does support quite a lot of versions and this is quite powerful
2:58
It says in here that this includes interacting with the devices file system, including file
3:02
creation, modification, exfiltration and removal, managing processes like listing and termination, extracting keychain data, credentials, monitoring, and stuff like that
3:11
So quite a lot of things that could be done. Also the patch by Apple is basically available now So if you want to make sure you don get this vulnerability or anything like this you can update to 16 if you not interested in jailbreak But this could be the key for a jailbreak
3:25
Right now, iOS 16.5 and 16.0 up to 16.5, those do not have a jailbreak available, at least on 812 plus devices
3:32
Sure, you can use Pellrain and all the checkmate compatible devices support it
3:37
but the checkmate compatible devices are basically the iPhone 10 and lower, which is basically many years old
3:43
At this point, the newer devices are the focus and those are not supported by any jailbreak
3:47
at the moment. These vulnerabilities over here could be useful for that
3:51
However, I would not recommend you to stay if you have any sensitive information on your
3:54
device or if you're a public person or stuff like that, somebody that could be targeted
3:58
by such attacks. Because these are basically zero-click or one-click attacks. You don't have to do much to get infected by this kind of vulnerability
4:05
So if you think you are a person at risk with this kind of vulnerabilities, then definitely keep
4:09
your device updated to the latest version. However, if you are the average Joe like me and many other people, you could probably use these for jailbreak purposes if they get used by the gelbrick community
4:19
So you should stay below iOS 16.5.1. So that's basically it. Thank you for watching
4:24
I am Gios now. Until the next time, peace out