Exploit Chains

From PS5 Developer wiki
Revision as of 19:39, 30 July 2024 by Thr33Day (talk | contribs) (I created this page to showcase exploit chain status, rather than individual exploits; for both personal and public documentation)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Exploit Chains

This page presents a compilation of exploit chains that utilize various Vulnerabilities identified on the PS5. It outlines the current functionalities of different potential and complete exploit chains for specific firmware versions.

Firmware Version Hypervisor Exploit Kernel Exploit Userland Exploit Chain Capability
2.50 Rumored [1] Unknown Rumored: PS4 Game Save Unreleased by Flatz Full Access to the system
1.00? - 4.03 N/A exFAT Driver Heap Exploit There is no implementation because of the difficulty in writing the exploit without a kernel dump. The proof of concept is a kernel panic when plugging in the drive and using the console for about a minute. N/A (PS4 uses IPV6_2292PKTOPTIONS Use after free (CVE-2020-7457)) N/A (PS4 uses pOOBs4 by ChendoChap) N/A
3.00 - 4.51 N/A IPV6_2292PKTOPTIONS Use after free (CVE-2020-7457) Webkit Cryptogenic's Implementation Elf Loader
1.00? - 4.51? N/A IPV6_2292PKTOPTIONS Use after free (CVE-2020-7457) bd-jb by TheOfficialFlow ps5-invoke-native by john-tornblom Native code execution within Blu-ray context

Here are some functions by john-tornblom