Don't panic: Checkm8 vulnerability for jailbreaking iPhones 2011 - 2017

Yesterday I already touched on the topic "Checkm8" here in the blog. It was about increased security on the iPhone by one alphanumeric access code. Now I would like to briefly elaborate a bit more on the jailbreak vulnerability Checkm8 (means “checkmate”), which is presented as super problematic in many places. Sure, the message sounds frightening at first, especially since the second bad news is that the error cannot simply be fixed by a firmware update from Apple. Nevertheless: the necessary way of working to exploit the gap, also known as Apollo or Moonshine, basically gives the all-clear.

All iPhone models from the iPhone 8s with an A4 chip to the iPhone 5 and iPhone X with an A8 chip are affected by the Checkm11 security hole. But there is no need to panic.
All iPhone models from the iPhone 8s with an A4 chip to the iPhone 5 and iPhone X with an A8 chip are affected by the Checkm11 security hole. But there is no need to panic.

Checkm8 Boot-ROM exploit requires USB connection

Malware to be used is a so-called boot ROM Feat, which in short and in layman's terms means that the software can make the device boot process work with any system. All iPhone models are affected, from the iPhone 4s with an A5 chip to the iPhone 8 and iPhone X with an A11 chip. There is a patch for newer Apple smartphones with A12 and A13 processors that closes the security gap. The iPhone models Xs, Xs Max, XR, 11, 11 Pro and 11 Pro Max are therefore protected against Checkm8.

For me, this means first and foremost that the jailbreak faction can be happy, because it gives them a permanent opportunity to jailbreak the old iPhone models. For hackers, however, the vulnerability is likely to be relatively uninteresting, as it cannot be exploited via the Internet and this limits the number of vulnerable devices. It is also a "tethered jailbreak", ie a wired attack that requires a USB connection to a Mac or PC.

Recommendation: USB condom and detailed information

In a post from January this year I gave you the PortaPow data block USB adapter presented. This can also be called a USB condom for fun. Because when plugged between the charging cable of your iPhone and a (public) USB socket, the adapter prevents data transfer. The highlight: there are only contacts for the flow of current, i.e. for charging the battery. The contacts for data transmission have simply been left out, so that hackers, boot ROM and other attacks or read-out attempts come to nothing. Always a good thing at the train station, airport or other charging port. For Checkm8 you can find the "Trail of Bits Blog" detailed information.

Did you like the article and did the instructions on the blog help you? Then I would be happy if you the blog via a Steady Membership or at Patreon would support.

Post a comment

Your e-mail address will not be published. Required fields are marked with * marked

In the Sir Apfelot Blog you will find advice, instructions and reviews on Apple products such as the iPhone, iPad, Apple Watch, AirPods, iMac, Mac Pro, Mac Mini and Mac Studio.

Specials