Home / Vulnerability Database / Objective-C : Insufficient jailbreak detection
Objective-C

Objective-C : Insufficient jailbreak detection

Classification

OWASP Mobile Top 10 2016
PCI DSS 4.0
CWE/SANS Top 25 2011
CWE/SANS Top 25 2021

Overview

The application uses a well-known method of testing for the presence of OS superuser rights (jailbreak). An attacker who has privileged access can bypass the check.

The application that works with valuable data must check the device for jailbreak and limit the functionality in case of a positive result. Some test procedures are published and, most likely, are known to the attacker, who as a result can bypass them. It is recommended to use a non-trivial tests for jailbreak.

Theoretically, having a root, an attacker can bypass any checks for jailbreak. But the more different non-trivial tests are used, the lower the probability of such an event.

MEDIUM

DerScanner Severity Score

Do you want to fix Objective-C : Insufficient jailbreak detection in your application?

See also

Objective-C

Objective-C : Internal information leak

Objective-C

Objective-C : Weak hashing algorithm

Objective-C

Objective-C : Unsafe reflection