Fugu15

Fugu15 is a semi-untethered jailbreak for iOS 15 (up to 15.4.1 or 15.5 beta 2 ). Like Fugu14, it only supports arm64e devices out of the box. It does not support tweak injection due to the fact that, at the time of the initial release, there was not a proper tweak injection system for iOS 15 that supported a rootless bootstrap. Fugu15 is an incomplete developer jailbreak and, in it's current form, does not provide much to a normal user.

It utilises 4 different exploits in order to perform the jailbreak, as jailbreaking on iOS 15.2+ now requires a PAC/PLL bypass, or both. The oobPCI exploit (CVE-2022-26763) is the kernel exploit used to gain kernel read/write. The fastPath vulnerability (CVE-2022-26766) is used to bypass codesigning and obtain arbitrary entitlements. The badRecovery exploit (CVE-2022-26765) is the exploit used to bypass Pointer Authentication Codes (PAC). Finally, the tlbFail exploit (CVE-2022-26764) is used to bypass Page Protection Layer (PPL).

It has been tested to work on the iPhone XS Max, iPhone 11, iPhone 12, iPhone 12 Pro Max, and iPhone 13.

Currently, opa334's fork of Fugu15 (Fugu15 Max) is the only known project to be building a working jailbreak off of Fugu15. The ellekit tweak injection system is planned to be used for tweak injection in this jailbreak.