Google’s Project Zero, a team focused on discovering vulnerabilities in others companies’ software, appears set to release an exploit it recently found in iOS 11. While the vulnerability has been patched with iOS 11.2, the exploit may allow for the first publicly available jailbreak for iOS 11.

As mentioned by Motherboard, it may sound curious to hear that Google, one of Apple’s biggest competitors was researching iOS vulnerabilities. However, this is exactly what Project Zero is designed to do, and one of its security researchers, Ian Beer, is a renowned iOS bug hunter.

Beer was responsible for finding and reporting to Apple 5 of the 15 security issues that the most recent iOS 11.2 update fixed. A tweet this week from Beer said that he will soon share more and gave a heads up to keep a device on 11.1.2 or earlier for those interested.

Motherboard notes that “tfp0 stands for ‘task for pid 0,’ or the kernel task port, which gives you control of the core of the operating system.” It also predicts that Beer won’t share a “full, untethered jailbreak, meaning you will have to plug the phone into a computer to exploit it ever time it boots up.”

However, those in the infosec space believe what Beer does release will allow for others to create a full jailbreak for iOS 11.

Marco Grassi, a researcher who’s done jailbreaks for Tencent’s Keen Lab, said that from Beer’s exploit it will “definitely be doable to make a complete jailbreak, especially for [iPhone] 6s and previous ones.”

While we saw a jailbreak demonstrated for iOS 11.1.1 last month, it hasn’t been made publicly available. As for Beer’s exploit, other people, such as developer and author Jonathan Levin, have already prepared resources to help interested parties make use of the tfp0 release.

Another aspect of Beer making these findings public is that is should help security researchers find other bugs and exploits.

It has been a tough (and abnormal) stretch as far as security and bugs go for Apple lately. Ranging from the serious root vulnerability on Mac, the zero day HomeKit vulnerability this week, to the less serious, but annoying ‘i’ autocorrect bug there have quite a few issues in a short amount of time.

However, like Zac mentioned yesterday, all of these issues give Apple a chance to look at adjusting and improving its procedures and protocol moving forward.

Check out 9to5Mac on YouTube for more Apple news:

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

About the Author

Michael Potuck

Michael is an editor for 9to5Mac. Since joining in 2016 he has written more than 3,000 articles including breaking news, reviews, and detailed comparisons and tutorials.