NEWS

UnjailMe Demos Sandbox Escape For iOS 11.2 By Zimperium On iOS 11.2.6

03/05/2018

9033

Developer MTJailed has released an IPA called UnjailMe. The project is described as a “sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan,” which, as we all know, was a set of bugs found in bluetoothd and reported to Apple to be patched in iOS 11.2.5.


Before we actually dive right in and take a look at what this is, it’s worth discussing what this isn’t.


UnjailMe Demos Sandbox Escape For iOS 11.2 By Zimperium On iOS 11.2.6


This particular project takes its roots from the research and discovery carried out by Rani Idan of the Zimperium zLabs Team. That work involved finding issues with bluetoothd daemons in iOS 11 which essentially mean that communications could be intercepted by someone with the requisite knowledge to put something together to that effect. MTJailed has used the initial proof-of-concept provided by Idan to essentially show this in action. With that said, this is not a jailbreak for iOS 11.2 through iOS 11.2.6. Nor is it a huge step towards one.


However, this is can be taken as an ever-so-small baby step towards someone with the required skills, capability, and interest working toward putting together the necessary components to produce a jailbreak for devices running iOS 11.2 through to iOS 11.2.6. And yes, the bug was supposedly patched with the release of iOS 11.2.5 but it would seem that Apple didn’t exactly do a great job of that by simply implementing a random number generator as part of the fix.


In order to demonstrate this, MTJailed has put together an available IPA which shows how relatively simple it is to achieve a privilege escalation situation where code can be run outside of the sandbox with system-level rights.


UnjailMe Demos Sandbox Escape For iOS 11.2 By Zimperium On iOS 11.2.6


The developer has also stipulated that the app is meant for developers and researchers to gain a little more understanding and to see how the latest Zimperium bug can be used to get to this point. The theory here appears to be that MTJailed can show off this creation to show what is possible with the Rani Idan bug within the bluetoothd daemons but to also start the conversation around a potential iOS 11.2+ jailbreak “if code injection works.”


If you are interested in this project and want to give it a whirl for yourself, then you can head over to the GitHub page and see it for yourself.


Source: redmond pie

Windows
Mac OS
iOS
Linux
3uTools
Win 64-bit For this device
V9.0 2025-11-11
Download
Win 32-bit For this device
V9.0 2025-11-11
Download
3uTools V3.18
2025-09-18
Please use the 3uTools PC client to install the iOS client:
1、 Install either the Windows or Mac version of 3uTools on your computer
2、 Open the PC client and connect your device to the computer via USB cable
3、 After the connection is successful, wait for the computer to automatically install the mobile app for the device, or locate “Install Mobile App” on the computer and manually click to install.
3uTools
deb file
v3.01 2025-11-20
Download
rpm file
v3.01 2025-11-20
Download
Windows
iOS
Android
3uAirPlayer
Win 64-bit For this device
V6.0.2 2025-11-19
Download
Win 32-bit For this device
V6.0.2 2025-11-19
Download
iOS Device Mirroring (No App Required)
1、 Install 3uAirplayer on the Windows PC
2、 Open Control Center and select Screen Mirroring
3、 From the list, choose your PC to start mirroring
4、 Or connect your iOS device to the PC via USB to begin mirroring
Scan to get "3uAirPlayer" App