When the device is turned on, BootROM is executed first.
Detailed information about it can be found here. Introductionįirst, let's briefly describe the booting process of an iDevice and the role BootROM (a.k.a. In this article, we'll provide a technical analysis of this exploit and figure out what causes the vulnerability. Most likely you've already heard about the famous exploit checkm8, which uses an unfixable vulnerability in the BootROM of most iDevices, including iPhone X.