How it typically works?
- Exploitation of a vulnerability: Jailbreaking tools rely on exploiting flaws in iOS kernel, bootloader, or system processes.
- Privilege escalation: The exploit grants root-level access that normally is restricted.
- Persistence: Some jailbreaks modify the boot process (untethered) so the device remains jailbroken even after restart, while others require re-exploitation after reboot (tethered or semi-tethered).
- Installation of alternative package managers: Tools like Cydia allow users to download apps and tweaks outside the official App Store, bypassing Apple’s review process.
Common techniques & variants
- Tethered jailbreak
Requires connecting the device to a computer after every reboot to reapply the jailbreak exploit. - Untethered jailbreak
Survives reboots, providing permanent elevated access until patched by the vendor. - Semi-tethered or semi-untethered jailbreak
Device can reboot normally, but jailbreaking features need reactivation through an app. - Bootrom exploit
Exploits vulnerabilities in the device’s bootrom, which cannot be patched via software update. Considered the most powerful type. - Userland exploit
Takes advantage of vulnerabilities in user-level applications or services, easier for vendors to patch. - Rootless jailbreak
A more recent technique that avoids direct modification of system partitions but still bypasses Apple’s security model.
Impact
For individuals, jailbreaking voids warranties and exposes devices to malware not screened by Apple. For enterprises, the risks are significantly higher:
- Loss of integrity of mobile security policies (MDM profiles can be bypassed).
- Exposure to malicious apps distributed outside the App Store.
- Privilege escalation enabling attackers to steal credentials, corporate data, and cryptographic keys.
- Easier exploitation of vulnerabilities due to disabled system protections.
- Increased likelihood of persistence mechanisms making malware removal more difficult.
From a SecOps perspective, jailbroken devices are considered compromised assets and should be treated as high risk.
Further reading
- Apple: Support information on the dangers of jailbreaking. Read more
- OWASP Mobile Security Testing Guide (MSTG): Jailbreak detection and implications. Read more
- CISA: Mobile Device Security Practices. Read more
- SANS Institute: Mobile security and jailbreak detection. Read more
- Check Point Research: Jailbreak exploits and analysis. Read more