Ian Beer is a name much of the jailbreak community will recognize, and that’s because he’s a talented security researcher who discovered and published a plethora of different tfp0 exploitsover the years — many of which went on to further jailbreak tool development.
Although Beer has been somewhat quiet these past several months, it seems it was for a good reason, as the hacker took to Twitter Thursday afternoon after publishing details for what appears to be a kernel vulnerability impacting iOS & iPadOS 14.1 and below.
This is the first security exploit that Ian Beer has shared for any release of iOS 14. The details of the security exploit have also been published on the Project Zero Blog. As per the explanation, the vulnerability allows an application to run arbitrary code with elevated kernel privileges on an iPhone or iPad.
CVE-2020-27932: iOS Kernel privesc with turnstiles: https://t.co/J7BUoG8AzL
— Ian Beer (@i41nbeer) February 4, 2021
Many of Ian Beer’s previous work has led to a jailbreak tool being available for the latest release of iOS. However, before you get your hopes up, Ian Beer has currently only shared a vulnerability in iOS 14. This vulnerability needs to be turned into an exploit before a developer could use it to jailbreak iOS 14 – iOS 14.1. That’s a lot of work and it remains to be seen which developer or jailbreak team puts the effort into jailbreaking iOS 14 and iPadOS 14.
Another thing worth noting is that the exploit doesn’t work out of the box with PAC-equipped devices such as the iPhone XS and newer, which means it would be limited to the iPhone X and older without a PAC bypass mechanism. For what it’s worth, the checkra1n tool can already jailbreak an iPhone X or earlier running iOS 14.1 or below.
Are you eagerly looking forward to an iOS 14 – iOS 14.4 jailbreak? Or have you given up on jailbreaking completely? Drop a comment and let us know!