NEWS

Abraham Masri Drops iOS 11.3 0day Vulnerability

03/06/2018

5260

We’re living amongst a jailbreak community which just keeps on giving. Abraham Masri, the developer behind the Houdini and Saigon projects, has announced and published what he is calling a “0day” vulnerability in Apple’s latest iOS 11.3 beta release.


Whenever you mentioned the term “0day” you can almost see and feel the collective arms of the jailbreak community being thrown in the air in excitement as they begin to ponder on the potential of a jailbreak for the affected firmware versions.


However, in this instance, it’s worth noting that the finder of the flaw, which in this case is Abraham Masri, has himself stipulated that “due to the nature of this flaw, you cannot do much”with it. It seems that members of the jailbreak community are in the business of giving excitement with one hand and then snatching it away with another. With that said, there is also an admission that this could potentially lead to something in the future.


Abraham Masri Drops iOS 11.3 0day Vulnerability


The bug found by Masri lives in the securityd aspect of Apple’s iOS platform and has been discovered in iOS 11.3, which is currently in beta. This also means that it will exist in previous versions of iOS which are currently in public use, such as iOS 11.2.6 and below.


Before publishing his proof-of-concept, Masri did report the issue to Apple directly, which means that the flaw is likely to be patched in iOS 11.3 when it’s finally released to the public in the coming weeks and months, but that does still leave earlier versions such as iOS 11.2.6 potentially vulnerable and able to be exploited.

Abraham Masri Drops iOS 11.3 0day Vulnerability


Other prominent members of the jailbreak community have also jumped in on the discussion. Siguza has expressed his belief that this could potentially offer a route to sandbox escape and potential root access but later provided an update to suggest that more investigation is needed as “securityd runs as its own user.” Masri has also put together a fairly in-depth write-up on the flaw, outlining exactly what it is, which is designed to be read alongside the published proof-of-concept.


Source: redmond pie

Windows
Mac OS
iOS
Linux
3uTools
Win 64-bit For this device
V9.0 2025-11-11
Download
Win 32-bit For this device
V9.0 2025-11-11
Download
3uTools V3.18
2025-09-18
Please use the 3uTools PC client to install the iOS client:
1、 Install either the Windows or Mac version of 3uTools on your computer
2、 Open the PC client and connect your device to the computer via USB cable
3、 After the connection is successful, wait for the computer to automatically install the mobile app for the device, or locate “Install Mobile App” on the computer and manually click to install.
3uTools
deb file
v3.01 2025-11-20
Download
rpm file
v3.01 2025-11-20
Download
Windows
iOS
Android
3uAirPlayer
Win 64-bit For this device
V6.0.2 2025-11-19
Download
Win 32-bit For this device
V6.0.2 2025-11-19
Download
iOS Device Mirroring (No App Required)
1、 Install 3uAirplayer on the Windows PC
2、 Open Control Center and select Screen Mirroring
3、 From the list, choose your PC to start mirroring
4、 Or connect your iOS device to the PC via USB to begin mirroring
Scan to get "3uAirPlayer" App