Georgia Tech Researchers Jailbreak iOS 7.1.2


August 11, 2014

Security researchers at the Georgia Tech Information Security Center (GTISC) discovered a way to jailbreak current generation Apple iOS devices (e.g., iPhones and iPads) running the latest iOS software.

The jailbreak, which enables circumvention of Apple’s closed platform, was discovered by analyzing previously patched vulnerabilities with incomplete fixes.

It shows that quick workarounds mitigating only a subset of a multi-step attack leave these devices vulnerable to exploitation. Patching all vulnerabilities for a modern, complex software system (i.e., Windows and iOS) is often difficult due to the volume of bugs and response-time requirements.

“Our work shows that software vendors must patch all publicly disclosed threats, as they may be exploited in other, equally disruptive attacks,” said Yeongjin Jang, one of the Ph.D. students who led this study.

During Black Hat USA, held from Aug. 2 to 7 in Las Vegas, the GTISC research team  disclosed the process for jailbreaking the current version of iOS (7.1.2) on any iOS device, including the iPhone 5s.

“We start by finding new ways to exploit vulnerabilities with incomplete patches,” said Tielei Wang, a GTISC faculty member who worked closely with Jang as lead of the project. “Then, we use those vulnerabilities to discover new avenues of attack. We’ll detail these vulnerabilities and the exploit techniques that we developed.” 

The research team includes Ph.D. students Yeongjin Jang and Byoungyoung Lee, and research scientists Tielei Wang and Billy Lau.