<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://freemyipod.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=TISFMiP</id>
	<title>freemyipod - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://freemyipod.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=TISFMiP"/>
	<link rel="alternate" type="text/html" href="https://freemyipod.org/wiki/Special:Contributions/TISFMiP"/>
	<updated>2026-04-09T07:11:59Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://freemyipod.org/index.php?title=ByteFau1t&amp;diff=22176</id>
		<title>ByteFau1t</title>
		<link rel="alternate" type="text/html" href="https://freemyipod.org/index.php?title=ByteFau1t&amp;diff=22176"/>
		<updated>2025-12-01T03:19:17Z</updated>

		<summary type="html">&lt;p&gt;TISFMiP: Article about the new vulnerability ByteFau1t&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== ByteFau1t Vulnerability ==&lt;br /&gt;
{{DISPLAYTITLE:ByteFau1t}}&lt;br /&gt;
&lt;br /&gt;
ByteFau1t is a flaw in the IMG1 partition-type handling logic inside the SecureROM of the&lt;br /&gt;
iPod nano (7th generation). The bug causes the integrity verification step for certain&lt;br /&gt;
IMG1 images to be skipped, allowing modified data inside the rsrc partition to load&lt;br /&gt;
without any signature checks.&lt;br /&gt;
&lt;br /&gt;
The issue was discovered by Fong and publicly disclosed on 30 June 2025.&lt;br /&gt;
&lt;br /&gt;
=== Affected Devices ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Device !! Vulnerable? !! Notes&lt;br /&gt;
|-&lt;br /&gt;
| iPod nano 7G (2012) || Yes || Verified working&lt;br /&gt;
|-&lt;br /&gt;
| iPod nano 7G (rev A)(2015) || Yes || Same SecureROM code path&lt;br /&gt;
|-&lt;br /&gt;
| iPod nano 6G || ? || Early tests suggest it does not work&lt;br /&gt;
|-&lt;br /&gt;
| Other S5L-based devices || Unknown || No confirmed evidence&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Summary ===&lt;br /&gt;
&lt;br /&gt;
The vulnerability is triggered by modifying the *format byte* inside the IMG1 header&lt;br /&gt;
stored within the rsrc partition. Inside the IPSW, this byte is found in the MSE file.&lt;br /&gt;
There is only one instance of the signature:&lt;br /&gt;
&lt;br /&gt;
  38 37 34 30 32 2E 30 04&lt;br /&gt;
&lt;br /&gt;
The final byte (04) represents an *unencrypted + signed* IMG1 image.&lt;br /&gt;
Changing it to 03 marks the image as *encrypted + signed*.&lt;br /&gt;
&lt;br /&gt;
When SecureROM processes an IMG1 image marked as encrypted (03) but whose contents are&lt;br /&gt;
actually unencrypted, it enters an alternative decryption-handling path. This path has&lt;br /&gt;
an unhandled condition for unencrypted data, causing the entire integrity verification&lt;br /&gt;
step to be skipped. As a result, SecureROM accepts and loads modified IMG1 data as if&lt;br /&gt;
it were valid.&lt;br /&gt;
&lt;br /&gt;
=== What ByteFau1t Allows ===&lt;br /&gt;
&lt;br /&gt;
* Modification of rsrc contents without using any previous untethered exploits And it doesn&#039;t require pressing any buttons.&lt;br /&gt;
&lt;br /&gt;
ByteFau1t does **not** provide full SecureROM code execution, but it enables UI&lt;br /&gt;
customization, resource patching, and limited modification of system content embedded&lt;br /&gt;
in rsrc.&lt;br /&gt;
&lt;br /&gt;
=== Technical Details ===&lt;br /&gt;
&lt;br /&gt;
* The MSE file holds multiple IMG1 headers&lt;br /&gt;
* The format byte determines the SecureROM decryption/verification path&lt;br /&gt;
* The “encrypted + signed” path (03) expects a specific internal decoder state&lt;br /&gt;
* Feeding unencrypted data into this path results in an inconsistent state&lt;br /&gt;
* In this state, the final cryptographic integrity check is  skipped entirely&lt;br /&gt;
* SecureROM proceeds as though the image were verified&lt;br /&gt;
&lt;br /&gt;
This is a logic flaw, not a memory-corruption vulnerability.&lt;br /&gt;
&lt;br /&gt;
=== Status / Fix ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Property !! Value&lt;br /&gt;
|-&lt;br /&gt;
| Fixed in || Not fixed&lt;br /&gt;
|-&lt;br /&gt;
| Patched devices || None&lt;br /&gt;
|-&lt;br /&gt;
| Discovered by || Fong&lt;br /&gt;
|-&lt;br /&gt;
| Disclosed || 30 June 2025&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Nano 6G Possibility ===&lt;br /&gt;
&lt;br /&gt;
Attempts to apply the method to the iPod nano 6G were unsuccessful.&lt;br /&gt;
Nano 6 SecureROM uses a probably different circuit.&lt;br /&gt;
Current research status: incompatible.&lt;/div&gt;</summary>
		<author><name>TISFMiP</name></author>
	</entry>
</feed>