Search

Subscribe Our News

Subscribe Our News

An MIT student has discovered a vulnerability in Vision Pro by using a kernel exploit. Find out more about it here.

The present technological revolution that the world is witnessing is mostly being driven by innovations in AI, Meta, AR, and VR.

One notable example is the recently released Vision Pro headset from Apple, which has generated a lot of discussion on social media.

This innovative device was just released into retail locations nationwide.

A Massachusetts Institute of Technology (MIT) PhD candidate asserted to have found a potential weakness in the visionOS software of the headset following its offline release.

According to AppleInsider, if these rumors are accurate, it may open the door for the future creation of jailbreaks and possibly dangerous apps for the iPhone.

On launch day, Joseph Ravichandran, an MIT student specializing in Microarchitectural Security, posted a screenshot on the ‘X’ platform revealing what he believes to be the first-ever kernel attack for the Vision Pro.

This is comparable to attempts to jailbreak iOS devices, and it reflects the efforts of both malware creators and security professionals who frequently look for flaws in the original versions of major software systems.

According to the MIT student on “X,” the Vision Pro crashes when the kernel exploit is tested, “switching to full passthrough and displaying a warning to remove the device in 30 seconds so it can reboot.”

As stated in the report, the panic log shows that the kernel crashed following the reboot.

Another photo that the user posted shows the “Vision Pro Crasher” program, which has a button that says “Crash My Vision Pro” and a 3D skull icon that is wearing a headset.

When jailbreaking a device, kernel exploits are essential since they allow operations that are normally restricted in the software.

As per iDownloadBlog, this entails installing rogue apps, altering the user interface, and unlocking other essential features.