
There’ve been so many kernel exploit releases for the iOS
platform as of late that our heads are still spinning, but that’s pleasant news
if you’re a jailbreak aficionado,
because it gives our respected jailbreak tool developers more resources to work
with.
The latest kernel exploit reportedly comes by way of hacker PsychoTea,
and it has been named machswap. The exploit appears to be viable on all A7-A9
devices running iOS 11.0-12.1.2, which could make it a worthwhile candidate for
modern jailbreak tools such as Electra or unc0ver.

Citing the
official GitHub page, machswap was jointly discovered and released by
renowned security researchers @S0rryMyBad and Brandon Azad, both
of which are responsible for releasing
high-profile iOS 12-centric exploits in recent memory.
Furthermore, the structure of this exploit is purportedly based
upon the task_swap_mach_voucher bug (CVE-2019-6225) that was fixed in iOS 12.1.3,
and the exploit drew much of its inspiration from @s1guza’s v0rtex exploit.
Most handsets in the A7-A9 range are considered “4K”
devices, and as you might recall, these can
be partially-jailbroken on iOS 12 with Pwn20wnd’s unc0ver jailbreak tool.
This is achieved with tihmstar’s
v3ntex exploit, but this newer machswap exploit is said to have a much
higher success rate, which means it could potentially improve the current
jailbreak circumstances.
It remains to be seen if the new machswap exploit will be
utilized by any of the contemporary jailbreak tools, but a full writeup about
the exploit and how it works is allegedly in the works and will be released in
the future (no ETA provided as of now).
Are you excited about all the exploit developments for iOS
12 as of late? Discuss in the comments section below.