Jailbreak developers have achieved iOS 13.4.1/ 13.4 / 13.3.1 Untethered Jailbreak tfp0 Kernel Exploit on A13 device. Earlier yesterday @ProteasWang has shared on twitter that he has successfully achieved tfp0 bug and exploit which is affecting latest iOS 13.4.1 on A13 device.
A couple weeks ago checkra1n team has already released checkra1n 0.10.1 beta; a semi-tethered jailbreak for iOS 13.4 & iOS 13.4.1. Linus Henze has also released Fugu 0.4 jailbreak update for iOS 13.4.1. These jailbreak tools are based on the ‘checkm8’ bootrom vulnerability, which is an uncommon bootrom bug that affected A7-A11 iOS devices and the release of security patches cannot fix these types of exploits. But the jailbreak on A12-A13 devices was achieved with tfp0 bug that can be fixed by Apple through Software update.
A tfp0 vulnerability which appears on a single smartphone may be fine-tuned to operate with older devices in certain situations, so this ensures that such a A13-exploit will be compatible with A12 and older devices too.
Later on, GeoSn0w also shared a video on twitter claiming that he also has successfully achieved iOS 13.4.1/ 13.4 / 13.3.1 Untethered Jailbreak tfp0 Kernel Exploit on A13 and A12 devices. Additionally, he also said that “this is massive! tfp0 kernel exploit achieved on the latest #iOS to date AND Untethered!”.
This is still unclear whether the jailbreak developers will release this iOS 13.4.1/ 13.4 / 13.3.1 untethered jailbreak tfp0 kernel exploit to public or not. If this tfp0 bug will be open source then know like Pwn20wnd and CoolStar will be able to implement it into an untethered jailbreak tool and that would be a great treat for jailbreakers.
There seems to be actually no way to jailbreak iOS 13.4.1 on any device apart from those devices which get support by checkra1n. In addition, Apple seems to have multiple patches on the right track, so it needs to be seen whether such patches will fix this recently revealed tfp0 vulnerability.