Jailbreak (iOS)
What is Jailbreak (iOS)?
Jailbreak (iOS)The process of bypassing Apple's code-signing and sandbox restrictions on an iPhone or iPad so the user can install software that Apple has not approved.
Jailbreaking exploits vulnerabilities in iOS, in the bootchain, or in the kernel to disable signature enforcement, mount the root file system read-write, and install package managers such as Cydia or Sileo. Public jailbreaks have historically used kernel bugs (for example checkm8 on A5-A11 SoCs, or unc0ver and checkra1n chains) and were patched in subsequent iOS releases. While some users jailbreak for customization, the practice removes a significant part of Apple's security model: it disables the App Sandbox boundary, weakens Data Protection, and can leave a persistent backdoor or expose the device to malware such as KeyRaider. Most enterprise MDM and banking apps refuse to run on jailbroken devices.
● Examples
- 01
checkra1n uses the checkm8 bootrom vulnerability to jailbreak A5-A11 iPhones.
- 02
A banking app exits at launch after detecting that /Applications/Cydia.app exists.
● Frequently asked questions
What is Jailbreak (iOS)?
The process of bypassing Apple's code-signing and sandbox restrictions on an iPhone or iPad so the user can install software that Apple has not approved. It belongs to the Mobile Security category of cybersecurity.
What does Jailbreak (iOS) mean?
The process of bypassing Apple's code-signing and sandbox restrictions on an iPhone or iPad so the user can install software that Apple has not approved.
How does Jailbreak (iOS) work?
Jailbreaking exploits vulnerabilities in iOS, in the bootchain, or in the kernel to disable signature enforcement, mount the root file system read-write, and install package managers such as Cydia or Sileo. Public jailbreaks have historically used kernel bugs (for example checkm8 on A5-A11 SoCs, or unc0ver and checkra1n chains) and were patched in subsequent iOS releases. While some users jailbreak for customization, the practice removes a significant part of Apple's security model: it disables the App Sandbox boundary, weakens Data Protection, and can leave a persistent backdoor or expose the device to malware such as KeyRaider. Most enterprise MDM and banking apps refuse to run on jailbroken devices.
How do you defend against Jailbreak (iOS)?
Defences for Jailbreak (iOS) typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Jailbreak (iOS)?
Common alternative names include: iOS jailbreak.
● Related terms
- mobile-security№ 948
Rooting (Android)
Gaining unrestricted superuser (root) privileges on an Android device, bypassing the protections enforced by the Linux kernel, SELinux, and the Android verified boot chain.
- mobile-security№ 693
Mobile App Sandbox
An operating-system enforced boundary that limits what files, IPC, and APIs a mobile application can access, so a compromised app cannot easily reach other apps' data.
- mobile-security№ 694
Mobile App Security
The practice of designing, building, and testing iOS and Android applications to protect user data, prevent reverse engineering, and resist runtime tampering.
- mobile-security№ 550
iOS Malware
Malicious software targeting Apple iPhones and iPads, including supply-chain attacks on app developers, mercenary spyware, and threats specific to jailbroken devices.
- mobile-security№ 697
Mobile Device Management (MDM)
Software that lets an organization enroll, configure, monitor, and remotely wipe iOS, Android, macOS, and Windows endpoints from a central console.
- mobile-security№ 810
Pegasus Spyware (NSO Group)
A commercial mobile spyware developed by the Israeli company NSO Group that infects iOS and Android phones, often through zero-click exploits, and exfiltrates messages, calls, location, and microphone data.