You can get all the Checkm8 exploit related information through this page. New Jailbreak developed using Checkm8 exploit as Checkra1n Jailbreak.
What is Checkm8?
axi0mX introduced the Checkm8 exploit, which works on many iDevices. It is an unpatchable & unblockable exploit to make a permanent jailbreak for almost all iPhones and iPads. This bootrom Checkm8 exploit impacts iPhone 4S to iPhone X and many iPads.
Almost all previous tool’s exploits allow the iOS version to jailbreak. But this Checkm8 exploit is more special than others. This BootROM vulnerability gives access to iOS devices. That’s why it’s called an unpatchable jailbreak exploit. It will be unable to patch or block using future iOS software updates.
Other than the jailbreak possibility, it can downgrade or upgrade the iOS version using this exploit without saving the SHSH blob. Hereafter anyone doesn’t worry about the SHSH blob for downgrading or upgrading iOS version.
iPhone 4S, iPhone 5, iPhone 5C, iPhone 5S, iPhone 6 & iPhone 6 Plus, iPhone 6S & iPhone 6S Plus, iPhone SE, iPhone 7 & iPhone 7 Plus, iPhone 8 & iPhone 8 Plus, iPhone X
iPad 2, iPad Mini, iPad Mini 2, iPad Mini 3, iPad Mini 4, iPad Air, iPad Air 2, iPad 5 (2017), iPad Pro (12.9 in), iPad Pro (9.7 in), iPad Pro (10.5 in), iPad Pro (12.9 in), iPad 6G, iPad 7G
Note – Not supported with iPhone XS, iPhone XR, iPhone XS Max, iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max.
Also, iPhone 8 & iPhone 8 Plus, iPhone X partially works iOS 14 onwards.
All the iOS versions (which is run on above supported devices)
iOS 14.7.1, iOS 14.7, iOS 14.6, iOS 14.5.1, iOS 14.5, iOS 14.4.2, iOS 14.4.1, iOS 14.4, iOS 14.3, iOS 14.2, iOS 14.1, iOS 14.0.1, iOS 14, iOS 13.7, iOS 13.6.1, iOS 13.6, iOS 13.5.1, iOS 13.5, iOS 13.4.1, iOS 13.4, iOS 13.3.1, iOS 13.3, iOS 13.2.3, iOS 13.2.2, iOS 13.2, iOS 13.1.3, iOS 13.1.2, iOS 13.1.1, iOS 13.1, iOS 13, iOS 12.5.4, iOS 12.5.3, iOS 12.5.2, iOS 12.5.1, iOS 12.5, iOS 12.4.9, iOS 12.4.8, iOS 12.4.7, iOS 12.4.6, iOS 12.4.5, iOS 12.4.4, iOS 12.4.3, iOS 12.4.2, iOS 12.4, iOS 12.3.2, iOS 12.3.1, iOS 12.3
Speciality of Checkm8 exploit
Checkm8 exploit works on iDevices. Not on the iOS version.
It cannot be unpatched or unblocked with iOS software updates.
It will work through PC and USB
A5 to A11 (iPhone 4S to iPhone X) are compatible with Checkm8.
All the latest iOS versions, which run on supported iDevices can be jailbreakable.
It will be a tethered jailbreak.
It is possible to downgrade any iOS version without saving SHSH.
Checkm8 exploit for Jailbreak
axi0mX has published the exploit as an open source project to find the jailbreak tool for any tool developer. Also axi0mX says that it will be a permanent tethered jailbreak, which Apple cannot unpatched.
Now it has released Checkra1n Jailbreak using Checkm8 exploit by the Checkra1n team. It can be used up to the latest iOS 14.7.1 on A5-A11devices. Please refer to the following pages to find more details.
However, it is still not compatible with iOS 15 Jailbreak (beta).
Linus Henze released Fugu jailbreak for iOS 13.3 – iOS 13.3.1 using Checkm8 exploit. Currently, iOS 13 – iOS 13.3.1 running on iPad Pro (2017) and iPhone 7 are supported devices.Still in the development stage and developers can try this method to develop more.
New RestoreM8 iOS Downgrade Tool released!
The all in one RestoreM8 app to downgrade A7 – A11 devices with shsh2 blobs using the CheckM8 exploit.With this Futurerestore / RestoreM8 app, developer 80036nd (@80036ndyt) sharing two methods to save SHSH blobs as Save SHSH2 Blobs With TSS Saver Online and Save SHSH2 Blobs by TSS Checker [Offline ECID Blobs Saving].
How to use CheckM8 BootROM exploit
- Step guide for iOS 13.1.1 and below users
Step 01 – Download axi0mX’s iPwnDFU from GitHub.
Step 02 – Unzip the downloaded zip file.
Step 03 – Then open a terminal and run the extracted file path as
/cd _extracted file path
Step 04 – connect iDevice with the computer using a USB cable.
Step 05 – Put the device into DFU mode and keep the device connected with the computer.
Step 06 – In the terminal run as ./ipwndfu -p
Step 07 – Now your iDevice in DFU mode until the iPhone reboots. (You can see black screen on your iPhone)
Video guide for iOS 13.1.2 users
Checkm8 exploit highlights
Checkra1n jailbreak based on the Checkm8 exploit
Developer of the Checkm8 tweeted about Checkra1n jailbreak ETA. According to axi0mX it will be released soon.
It seems that Jailbreak was developed by qwertyoruiopz (Luca Todesco ) and axi0mX. He demonstrated booting iPhone SE on iOS 13.1.2 and iPhone X on iOS 12.4 with checkm8-iousb. Further he said it works across most devices/versions across iOS 12 and iOS 13. Most probably, Luca developed this tethered exploit as an untethered Jailbreak.
10.3.3 OTA Downgrade Script for the iPhone 5s using checkm8
Matthew Pierson known as Matty released iOS 10.3.3 OTA downgrade Script for the iPhone 5s using checkm8. Its new method to downgrade with OTA blobs to iOS 10.3.3 without SHSH.
This will be compatible with all A7 devices that are now supported (except iPad4,6) Check here for instructions.
Verbose boot on iPhone X running iOS 13.1.1 or iOS 13.1.2
axi0mX confirmed Verbose boot works perfectly running iOS 13.1.1 or iOS 13.1.2 on iPhone X also gives the chance to try to download the latest iPwnDFU enter DFU mode. axi0mX says that there is no risk and it’s 100% safe.
Jailbreak possibility of iPhone X iOS 13.1.1 with Checkm8
It has proven the iOS 13.1.1 jailbreak possibility on iPhone X with Checkm8. The famous hacker and the developer axi0mX published twitter status to inform Checkm8 exploit work perfectly on iPhone X running latest iOS 13.1.1 version.
He published a video of verbose boot starting with DFU mode. Within two seconds it was completed the Checkm8 jailbreak.
axi0mX has published the name of the exploit as Checkm8 for the first time.
First and ever, unpatchable bootRom exploit has been introduced by axi0mX via his Twitter account as Checkm8. Also mentioned the supporting iDevice list as iPhone 4S to iPhone 8 and iPhone X Jailbreak.
GeoSnow’s explain about Checkm8
GeoSnow explained well about Checkm8 exploit well. According to his article it is a SecureRom exploit. A12 and A13 devices are not supported. All the iOS versions from iOS 7 to the latest iOS versions up to iOS 13.1.2 are jailbreakable with this SecureROM exploit.
GeoSnow has published a step guide, how to use PwnDFU mode on newer iOS devices running iOS 13.1.1 with axi0mX’s iPwnDFU. PwnDFU mode helps to restore a CFW for CFW iCloud bypass, jailbreak and downgrade.
Pwn20wnd Twitter status about Checkm8
Pwn20wnd has appreciated axi0mX’s work publishing a Twitter status. He also confirmed that it is a lifetime jailbreak exploit for every present and future iOS versions on mentioned iDevices.
axi0mX introduced the Checkm8 exploit for the first time.
Publishing 12 Twitter threads axi0mX well explained about his exploit. According to him It is just an exploit so far. Therefore you cannot download and install Cydia with it. But researchers and developers can convert it as a jailbreak tool in future.