Sony's last-gen consoles got their respective jailbreaks within 2 years of release and so did the PS5. On 2nd October 2022, a Wololo user (Wololo is the website tracking PS5 jailbreak status) posted the implementation of the PS5 IPV6 Kernel exploit.
This release relies on the Webkit vulnerability as an entry point, meaning it will work on any PS5, including the Digital edition, running firmware 4.03. Lower firmware might work, although the exploit might need tweaking. Higher firmware will not work now as they are not vulnerable to the Webkit exploit.
Sony released their next-gen Playstation 5 console on the 12th of November, 2020. It is the first ever console in the gaming industry to support 4K 60 fps gaming with partial ray tracing. Although the console has been a commercial success, the company faced numerous difficulties due to the semiconductor shortage in 2020.
What interested gamers need to know about the PlayStation 5 4.03 Kernel Exploit
Mind that this jailbreak version is completely new and will create problems because of its instability. So, install it at your own risk.
Disclaimer: Cyber Tech Tok doesn't promote any kind of piracy. This post is just for entertainment and information purposes and gamers must respect the developer's hard work by buying the games instead of pirating them.
Limitations of the PlayStation 5 4.03 Kernel Exploit
The jailbreak is completely new. It has some disadvantages or limitations as well which include:
As mentioned earlier, This exploit is fairly unstable and works only about 30% of the time. So it is advised to maintain patience as few attempts are necessary for the thing to work.
This exploit only allows for reading/writing and doesn't allow any kind of execution access. And this implies that it is impossible to load or run binaries at the moment. Everything will be constrained within the scope of the ROP chain. The Debug settings are however enabled by the current implementation of the exploit.
This exploit only achieves read/write, and not any code execution. Since the kernel .text pages are marked as eXecute Only Memory (XOM), we cannot currently dump kernel code for gadgets. kernel .text pointers will panic if any attempt is made to read kernel.text pointers
According to the hypervisor (HV), who enforces kernel write protection, and as mentioned above, these exploits also fail to install any patches or hooks into kernel space, which means for the time being no homebrew-related code is executed.
The Clang-based fine-grained Control Flow Integrity, also known as CFI is present and will be enforced.
After the task is completely executed, the circle button on the PS controller helps in leaving the browser. Although for some unknown reason the PS button panics while usage.
As mentioned earlier, the stability of this exploit is currently very poor.
Stability Notes
This version is very unstable and may cause failure 30% of the time. So it is requested to install it at your own risk it may brick the system and installing it will also lead to the console being devoid of its warranty.
Summarising the above, it can be said that this build is only good for hackers. Gamers waiting for the jailbreak must wait a bit more to get a stable version. Since the console is already cracked, this wait will not be that much longer.
Read More: Will RTX 4080 be worth buying?
Comments