This is an automated archive made by the Lemmit Bot.

The original was posted on /r/jailbreak by /u/AwesomeBros132 on 2024-10-28 20:00:20+00:00.


So I was watching the DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple’s USB-C controller and it was demonstrated that you can gain read-write privileges by changing a single bit on the ACE2 microcontroller (correct me if I’m wrong but to my knowledge this chip is on the iPhone 14 and lower).

The speaker told Apple about the vulnerability he found and they dismissed it giving him the ability to publish the vulnerability on GitHub.

The ACE2 chip receives patches externally but the speaker found a way to disable the signature verification if obtaining code-exec. This means that you can load your own firmware onto the chip. He also found that any modifications survive a full system restore.

I might just be blabbering about something useless but can someone explain to me if this can be used in the development of a jailbreak?

The iPhone 15 and above have the ACE3 chip (the ACE2’s successor) but and it is talked about in the video.