Apple iOS 15.2 fixes remote jailbreak vulnerability: hackers can crack iPhone in 1 second

Apple iOS 15.2 fixes remote jailbreak vulnerability: hackers can crack iPhone in 1 second

[[441084]]

Apple recently pushed the official version update of iOS 15.2, which brought many new contents and bug fixes.

According to Apple jailbreak team Qian Pangu, Apple also fixed a remote jailbreak vulnerability in iOS 15.2, which could "remotely jailbreak" the iPhone in one second.

The white hat hacker slipper from Pangu Lab exploited multiple vulnerabilities in the Safari browser and iOS kernel to launch a combined attack, gaining the highest control authority over the phone and remotely cracking an iPhone 13 in 1 second.

From the perspective of the attack principle, when a user clicks on a forged link, the remote code execution vulnerability of the Safari browser will be triggered, allowing the attacker to remotely execute attack commands.

After bypassing the Safari browser protection mechanism, slipper once again exploited multiple vulnerabilities in the iOS15 kernel and A15 chip to launch a combined attack, successfully bypassing multiple security protection mechanisms and gaining supreme control over the phone. It can obtain information at will, including photo albums, apps, etc., and can even directly delete data on the device or execute other arbitrary commands.

The attack is triggered when a user clicks a link, without any other interactive operations. The entire cracking process takes only 1 second. This vulnerability, which is fast in attack speed and simple in triggering, poses a huge threat to users.

<<:  Electronic driver's licenses are becoming more popular nationwide! A complete guide to applying for an electronic driver's license

>>:  Huawei once again took the first place in the 5G mobile phone market share list, and its accumulated advantages are obvious

Recommend

How to write high-conversion copy? Remember this universal formula!

Operational copywriting is a copywriting that per...

Tips for building B2B user portraits!

Let me share an approach to B2B user profiling . ...

The four major operating logics of Weibo Super Topic!

There was a "one hundred million" event...

The most comprehensive | 108 ways to promote products, come and try

1. SNS online store soft article promotion method...

Event planning and promotion: The planned activities never produce results?

Activities are a very common means of operation, ...

CATL vs BYD: Who will be the final winner?

Another daily limit, another daily limit! After t...

2019 College Entrance Examination Marketing Tips are here!

Abstract: With extremely high popularity, rich an...

How to write a new product development plan?

First of all, we must understand that everything ...

Thousand-word summary of the AARRR model’s retention methodology

Today we will continue with the user growth and r...

WeChat Enterprise Accounts Dialogue with Enterprise Mobile Platform

Recently, the "2014 Mobile Platform Summit F...

Hunchun SEO training: some basic knowledge of search engine optimization

There is a lot of common knowledge about SEO opti...