A new ARM9 exploit on Old3ds Safecerthax
And here was born a new ARM9 exploit on Old3DS under the name of Safercerthax, unveiled by Nba_Yoh.This new exploit of the ARM9 and ARM11 kernel is based on a process similar to that of the recovery mode on 3DS on OLD3DS SAFE_FIRM.
Safecerthax is based on SSLoth, it is based on bypassing the SSL / TLS certificate of the 3DS SSL sysmodule. Although the exploit was fixed in NATIVE_FIRM it was not fixed under SAFE_FIRM within firmware 11.4.
What is surprising is that on New3DS and New2DS Nintendo fixed the flaw, but not on Old3DS and 2DS, it is enough with a custom NUS server to activate the vulnerability and obtain a possibility of executing an arbitrary code in the code ARM9.
Full instructions can be found here: user-guide
It's all here: safecerthax
0 Comments