Home / Vulnerability Database / Objective-C : Insufficient jailbreak detection
Objective-C
Objective-C : Insufficient jailbreak detection
Classification
OWASP Mobile Top 10 2014
OWASP Mobile Top 10 2016
OWASP MASVS
PCI DSS 4.0
HIPAA
CWE
CWE/SANS Top 25 2011
CWE/SANS Top 25 2021
Overview
The application uses a well-known method of testing for the presence of OS superuser rights (jailbreak). An attacker who has privileged access can bypass the check.
The application that works with valuable data must check the device for jailbreak and limit the functionality in case of a positive result. Some test procedures are published and, most likely, are known to the attacker, who as a result can bypass them. It is recommended to use a non-trivial tests for jailbreak.
Theoretically, having a root, an attacker can bypass any checks for jailbreak. But the more different non-trivial tests are used, the lower the probability of such an event.
MEDIUM
DerScanner Severity Score
Do you want to fix Objective-C : Insufficient jailbreak detection in your application?
See also
Objective-C
Objective-C : Internal information leak
Objective-C
Objective-C : Weak hashing algorithm
Objective-C
