We have some great news for jailbreakers. After successfully getting root shell access in iOS 11.3, Chinese security researcher and hacker, Min Zheng aka SparkZheng has revealed that he has successfully jailbroken iOS 11.3.
Zheng has clarified that it wasn’t a jailbreak because he “didn’t remount the rootfs to R/W and install Cydia”. He also added that it was because “Apple had added a new mitigation on iOS 11.3 in APFS KEXT” which needs to be bypassed. But the good news is that iOS 11.2 – iOS 11.2.6 may be released soon by none other than coolstar. Check our post for all the details.
The original story continues below:
He tweeted “This time. It’s a real JB now” and has shared two screenshots. The first screenshot shows Cydia on the jailbroken iPhone’s Home screen and the second one seems to reveal that he was able to install the Cydia app after getting the shell access.
Before you get too excited, it is probably still early days as Zheng will still need to create a tool to jailbreak iOS 10.3 which can be released to the public. But the good news is that it is a matter of time for the iOS 11.3 jailbreak to be released. It also looks like the vulnerabilities used by Zheng to jailbreak iOS 11.3 has been patched in iOS 11.3.1 as he has only mentioned getting access to iOS 11.3 root shell in the previous tweet.
So if you’re on iOS 11.3 or lower, then you should stay where you are and avoid upgrading to iOS 11.3.1. Please also note that Apple has stopped signing iOS 11.3, so you won’t be able to downgrade back to iOS 11.3 to jailbreak your iOS device once the jailbreak is released.
It has been a very long wait for the jailbreak to be released, so we can’t wait to see when the iOS 11.3 jailbreak will be released.
We will let you know as soon as there is an update about the iOS 11.3 jailbreak, so don’t forget to signup for our Daily Newsletter so you don’t miss the latest jailbreak news. Check out our iOS 11 – iOS 11.3.1 jailbreak FAQ if you’ve any questions.
Are you excited about the possibility of a jailbreak? Let us know in the comments below.