Nintendo Switch hacked under the Webkit exploit
The Nintendo Switch has been hacked using the Webkit exploit
This video explains how in the short time that the Nintendo Switch has been hacked, in this case the architect of the feat has been LiveOverflow. The method used is a webkit exploit, which is an almost insulting vulnerability, considering that a website would only have to be accessed from the internal browser of the console software. On the other hand, the video also explains the similarities of the Switch software with IOS 9.3.
If you are a normal user, this will probably not matter to you, but for developers and hackers this is a gold mine since it is an entry point to be able to unravel the lines of firmware code and therefore look for more vulnerabilities, such as the manipulation of privileges that would give full access to the device (through a kernel exploit).
The other aspect that has drawn more attention to this security flaw is that it is very similar to the one used in IOS 9.3 to perform the Jailbreak using the “Jailbreakme” tool. By eliminating the lines of code referring to the IOS firmware and adapting them to that of the Switch, we can take advantage of the vulnerability of the console's internal browser and thus skip the protection so that it cannot be accessed (although the Switch does not have a browser to search the internet available to the user, it does have one to share the data internally). Using a proxy, the rest of the process is carried out in order to carry out this hack.
Nobody should worry within the group of users of Nintendo Switch today, since this does not mean any security problem at the level that spoils the gaming experience or puts your information at risk; rather, it can simply be used to load backup copies or offer its own browser.