5.6
CVSSv2

CVE-2019-8900

Vulnerability Summary

A vulnerability in the Boot ROM of some Apple devices can be exploited by an unauthenticated local malicious user to execute arbitrary code upon booting those devices. The Boot ROM, which is located within the processor, contains the first code executed by the processor upon booting the device. Because the Boot ROM is read-only, it cannot be patched with a firmware update.Apple devices that implement processing chips A5 through A11 are vulnerable. This corresponds to iPhone models 4S through X; additionally, certain models of iPad, Apple Watch, iPod Touch, and Apple TV are vulnerable. See the Malwarebytes blog entry for a full list of affected devices. Further details about the vulnerability are available in Ars Technica's interview with the vulnerability's discoverer.

Vulnerability Trend

Github Repositories

My journey to gain knowledge in the iPhone space

My main goal is to learn and have a-lot of knowledge about iOS SO for new comers like me i want to document all my steps I'm doing for taking some inspiration or learn from my mistakes 😜 Join to my journey! Running Checkm8 exploit exploit first time Milestone Steps buy 2nd *Phone vulnerable to checkm8 exploit the *Phone Checkm8 exploit install list: ssh oh-my