What the checkm8 BootROM exploit can do [FAQ]

CERT-LatestNews ThreatsStrategic VulnerabilitiesAdobe VulnerabilitiesAll VulnerabilitiesApple VulnerabilitiesApplications VulnerabilitiesFirmware VulnerabilitiesGoogle VulnerabilitiesHardware VulnerabilitiesLinux VulnerabilitiesOS
Q. What can the checkm8 BootROM exploit do? Jailbreak the latest signed firmware version as long as you have a vulnerable device. Tethered downgrades without SHSH Blobs to any compatible version. However, in doing so, you will encounter issues with the SEP (Secure Enclave Processor). Any feature that depends on SEP will simply not work.