Join Us and become a Member for a Verified Badge on Discord to access private areas with the latest PS4 FPKGs.
PS4 Jailbreaking       Thread starter PSXHAX       Start date Sep 25, 2020 at 12:39 AM       20,379       22      
Not open for further replies.
Since the PS4 6.XX JSC_ConcatMemcpy WebKit Exploit, PS4 6.20 WebKit Code Execution Exploit, PS4 Webkit Bad_Hoist Exploit for PS4 FW 6.XX, PS4 Webkit Bad_Hoist 6.72 Exploit Port and PS4JB 6.72 Jailbreak Exploit security researchers 0xdagger of and abu_y0ussef of who work at SYNACKTIV announced plans to discuss exploiting a 0-day PS4 WebKit vulnerability on 6.xx Firmwares at Black Hat Europe 2020. :geek:

This year the annual event will take place virtually from December 7-10th, 2020, and their presentation will outline the exploitation strategy used and the hurdles they encountered along the way for those in the InfoSec field or who are simply interested in learning for fun or to cash in on Bug Bounty Programs.

While most of the PS4 Scene is awaiting someone to make use of the PS4 7.02 Kernel Exploit (KEX) with Mira 7.00-7.02 PS4 WIP Ports already underway, according to @Abkarino of Team Rebug on Twitter to quote: "If it is 6.xx WebKit exploit only, then it will be useless for most unless if it is more stable than the current public one."

And to quote from the event page on

:arrow: This is for the Pwners : Exploiting a WebKit 0-day in PlayStation 4 / Github
  • Quentin Meffre | Security Researcher, Synacktiv
    Mehdi Talbi | Security Researcher, Synacktiv
  • Date: Thursday, December 10 | 10:20am-11:00am
  • Format: 40-Minute Briefings
  • Tracks: Exploit Development, Cloud & Platform Security
Despite an active console hacking community, only few public PlayStation 4 exploits have been released. The exposed WebKit-based browser is usually the entrypoint of a fullchain attack: from browser exploitation to kernel exploitation.

However, browser-engine hardening techniques together with the total absence of debugging capabilities make it very hard to successfully exploit bugs in the latest PS4 firmwares.

In this talk, we will present how we managed to debug then exploit a 0-day WebKit vulnerability on 6.xx firmwares. The bug has been reported by our fuzzers and is currently under the process of responsible disclosure.

The bug is a Use-after-Free (UAF) vulnerability in WebKit engine. The exploitation of this bug requires a deep understanding of WebKit's primary heap allocator. The key concepts of the allocator as well as the primitives required to massage the heap will be introduced to the audience.

In this talk, we will introduce the root cause of the bug. This bug provides limited exploitation primitives. However, thanks to a weakness we identified in ASLR mechanism, we were able to make this bug exploitable.

In this presentation, we will focus on the exploitation strategy we adopted to get code execution in the context of the browser process and how we turned in particular a Use-After-Free into a R/W primitive leading to code execution.

We will conclude our talk by outlining some of the hurdles we faced while attempting to port the exploit on the latest PS4 firmware.
Cheers to MSZ_MGS for passing along this news earlier today! 🍻
Exploiting 0-Day PS4 WebKit Vulnerability on 6.xx Firmwares at BHEU 2020.jpg



Senior Member
are you sure it's for 6.xx only considering the last line?

"We will conclude our talk by outlining some of the hurdles we faced while attempting to port the exploit on the latest PS4 firmware."

Based on time tables it maybe plausible for it to work on 7.55 (though a new kex is needed no doubt) plus the exploit is a 0 day so sony may still have not patched it (again a kex is still needed though) as i think the kex side of the >-7.02 kexploit was patched or was it only webkit?
Not open for further replies.

:fire: Latest Help Topics