A new ARM9 exploit on Old3ds Safecerthax

A new ARM9 exploit on Old3ds Safecerthax

And here was born a new ARM9 exploit on Old3DS under the name of Safercerthax, unveiled by Nba_Yoh.
 
This new exploit of the ARM9 and ARM11 kernel is based on a process similar to that of the recovery mode on 3DS on OLD3DS SAFE_FIRM.
 
Safecerthax is based on SSLoth, it is based on bypassing the SSL / TLS certificate of the 3DS SSL sysmodule. Although the exploit was fixed in NATIVE_FIRM it was not fixed under SAFE_FIRM within firmware 11.4.


What is surprising is that on New3DS and New2DS Nintendo fixed the flaw, but not on Old3DS and 2DS, it is enough with a custom NUS server to activate the vulnerability and obtain a possibility of executing an arbitrary code in the code ARM9.
 
Full instructions can be found here: user-guide
 
It's all here: safecerthax

Post a Comment

0 Comments