Apple has finally released the stable, final version of iOS 10.3.3 on July 19 and has detailed the firmware’s security content at support.apple.com/en-us/HT207923. This isn’t exactly news since Apple does this for every new iOS version they release. However, eagle-eyed members of the jailbreak community have combed through the document and found something that might mean that a jailbreaking tool will be released in the next few weeks or months.
Reddit user Vertsix opened a discussion about iOS 10.3.3, pointing out that popular jailbreaking team Pangu was not mentioned in the firmware’s security patch notes. A quick browse through the document shows that many individuals and teams have been credited for helping Apple spot security vulnerabilities in their mobile devices, but Pangu is not one of them.
One of the people credited in the patch notes is Nitay Artenstein, a security researcher with Exodus Intelligence who discovered CVE-2017-9417. The vulnerability, which has been nicknamed Broadpwn, is connected with the Broadcom Wi-Fi chipsets used in the 6th generation iPod touch, iPhone 5 and later models, and 4th generation iPad and alter models. Broadpwn causes a memory corruption issue that allows attackers within Wi-Fi range to “execute arbitrary code” on the chip and gain remote access to the user’s device.
Other people who have been mentioned in the security content document include José Antonio Esteban of Sapsi Consultores (credited for CVE-2017-7007), Ian Beer of Google Project Zero (credited for CVE-2017-7047), and Ivan Fratric of Google Project Zero (credited for CVE-2017-7039 and other vulnerabilities).
According to Vertsix, the fact that Pangu has not been credited for a security vulnerability means that “there is some hope” for a jailbreaking tool. Since the jailbreaking team has not reported anything to Apple, there’s a high chance that they’re holding on to a zero-day exploit and that they’re using it to build a jailbreak for iOS 10.3.3 and/or earlier versions.
Another Redditor with the username fattyffat pointed out that security research team KeenLab is also not credited in the security content document. This might mean that KeenLab is working on a jailbreak, although it only has a small chance.
It’s important to note that these are only inferences and must be taken with a grain of salt. Pangu and KeenLab have not confirmed anything and don’t have any official statements as to whether they’re creating jailbreaking tools or not.
Check this page to know more about iOS 10.3.3.