Jailbreak TFP0 exploit released for iOS 12.4.1-12.4.2

IMG 0022
IMG 0020

There has been an TFP0 (task_for_pid(0)) exploit released for iOS 12.4.1-12.4.2. This exploit was announced found by ZecOps on September 15, 2019, and they have finally released it today. If you are interested in looking at the proof of concept you can find it here.

So if those of you who missed the 12.4 signing window and saw there was an exploit announced, here is the exploit you all have been waiting for. Even though I’m sure there were only a few of you.

IMG 0019

Now the question of course, when will a jailbreak be released? On November 20, 2019, jailbreak tool, unc0ver, developer Pwn20wnd tweeted out that they will update the jailbreak tool as soon as it is available to the public. This should take more than a couple of days (probably less though) unless they run into some unforeseen issues.

As stated above, this is a TFP0 exploit. TFP0 stands for task_for_pid with a kernel task process ID of 0. This means that the user is removing restrictions from the device and allowing reading and writing on the kernel. This allows the user to install substrate (or in the case of A12(X) devices, substitute) onto the device allowing tweak injection and more.

For more information on this specific exploit, visit the ZecOps blog post here.

This is a developing story, this story will be updated. Be sure to follow us on Twitter and turn on notifications to keep up with the latest.

Default image
Daniel
Daniel, 25, has been following Apple products since the release of the first iPhone in 2007. He has been following the jailbreak scene since iPhone OS 1.0 in 2007. Around this time in 2007, he also started getting interested in developing apps and tweaks for iPhone OS devices. While he has not publicly completed any of these, he still continues to follow the Apple Beta and Apple Jailbreak scene closely. He also has a passion for web development and design.