New ‚OOB Timestamp‘ Exploit Released for A12/A13 Devices on iOS 13 – 13.3


A new exploit for A12 and A13 devices running iOS 13.0 to iOS 13.3 has been released by Brandon Azad.
In post on chromium.org, Azad introduces 'oob_timestamp', a proof-of-concept research exploit that exports the kernel task port.
In its current form, the exploit is designed not to work generically: it needs to be "tuned" to the specific research device on which it will be run. See oob_timestamp/README for a description of how to perform this tuning. I may release a more complete exploit at a later time.

Share Article:
Facebook, Twitter, LinkedIn, Email, Reddit, Digg, Delicious, StumbleUpon
Follow iClarified:
Facebook, Twitter, LinkedIn, Newsletter, App Store, YouTube

You Might Also Like