HardwareInternetNewsVideo Games

Nintendo Switch hacked under the Webkit exploit

The Nintendo Switch has been hacked using the Webkit exploit

This video explains how in the short time that the Nintendo Switch has been hacked, in this case the architect of the feat has been LiveOverflow. The method used is a webkit exploit, which is an almost insulting vulnerability, considering that a website would only have to be accessed from the internal browser of the console software. On the other hand, the video also explains the similarities of the Switch software with IOS 9.3.

If you are a normal user, this will probably not matter to you, but for developers and hackers this is a gold mine since it is an entry point to be able to unravel the lines of firmware code and therefore look for more vulnerabilities, such as the manipulation of privileges that would give full access to the device (through a kernel exploit).

The other aspect that has drawn more attention to this security flaw is that it is very similar to the one used in IOS 9.3 to perform the Jailbreak using the “Jailbreakme” tool. By eliminating the lines of code referring to the IOS firmware and adapting them to that of the Switch, we can take advantage of the vulnerability of the console's internal browser and thus skip the protection so that it cannot be accessed (although the Switch does not have a browser to search the internet available to the user, it does have one to share the data internally). Using a proxy, the rest of the process is carried out in order to carry out this hack.

Nobody should worry within the group of users of Nintendo Switch today, since this does not mean any security problem at the level that spoils the gaming experience or puts your information at risk; rather, it can simply be used to load backup copies or offer its own browser.

Show more

Andres Alvarez

First year student of Scientific Baccalaureate. Hardware, video game and film lover.

Related publications

Leave your comment

Your email address will not be published. Required fields are marked with *

Button back to top
Close

Ad blocker detected

This site is financed through the use of advertising, we always ensure that it is not too intrusive for the reader and we prioritize the reader's experience on the web. But if you block ads, some of our funding will be reduced.