Developer CelesteBlue has announced PsFree, a brand new WebKit exploit for PS4 6.00 to 9.60. A version (or pre-release) of the exploit is already available. Exploits should also work on PS5 1.00 to 5.50.
This WebKit exploit is based on CVE-2022-22620 by security researchers Sergey Glazunov and Maddy Stone. The PS4/PS5 implementation was originally implemented by scene member “abc” on the PlayStation DevWiki Discord forum, with further improvements and implementations by CelesteBlue.
Additionally, Celesteblue announced QuickHEN PS4 (screenshot above), a soon-to-be-released comprehensive toolkit that will include all required WebKit exploits for PS4 3.15 to 9.60 (and kernel exploits for supported firmware).
Disclaimer: At the time of release, the PsFree version was very current and still being tested by the hacker community. Results are not guaranteed. If you can’t handle the uncertainty, please wait until the dust settles. I’m sure the bug will be fixed soon. Testers report bugs and issues in the currently running version.
What is PsFree for PS4/PS5?
PsFree is a webtool exploit (in progress) for PS4 firmware 6.00 to 9.60 and PS5 1.00 to 5.50. It is based on CVE-2022-22620 by security researchers Sergey Glazunov and Maddie Stone. The PS4/PS5 version is developed by ABC and CelesteBlue.
A webkit exploit related to a PS4/PS5 hack is a user mode exploit. This allows limited access to run unsigned code in the console. While they can theoretically be used to run homebrew games, in practice such vulnerabilities are typically used as entry points or elevation of privilege attack vectors (also known as kernel exploits). In other words, such a user-mode exploit is usually not very useful to the end user, but when combined with a kernel exploit, it can lead to a console jailbreak.
As of this writing, PS4 (up to firmware 9.00) and PS5 (up to firmware 4.51) have publicly available kernel exploits. Although these kernel exploits are already used in other user mode entry points, using these web tools offers the following benefits:
- In firmwares with an existing entry point/kernel exploit kit, they can be used to replace existing vulnerabilities and potentially provide a more stable implementation (see below).
- Firmwares that do not yet have kernel vulnerabilities can be used as an entry point in the future once these kernel vulnerabilities are found. For security researchers, it provides an out-of-the-box entry point to delve deeper into the hardware.
According to CelesteBlue, exploitation is very fast and stable. Especially on PS4, it could replace the p00Bs4 exploit, which currently requires a USB stick of a specific format. Using reliable web tools will be more convenient for many people. The developer released a video demonstrating the speed of the exploit.
Finally, WebKit exploits for PS4 system software versions 6.00 to 9.60 are fast and stable. Thanks to Sergey Glazunov and @maddyston Write to me anonymously with a PsFree exploit to discover vulnerabilities, test, port and improve. PS4 9.00 offer: pic.twitter.com/5JgdomWr5P
— Celeste Blue (@celesteblue123) December 3, 2023
Current status of PSFree
Although CelesteBlue has yet to provide an “official” download link, PsFree can be found on relevant Discord servers and is already trending on Twitter. This may not be an “official” release yet, and is reported with what I personally believe to be a beta version at this point. Feel free to use it, but don’t expect great results just yet.
PS5 8.20-Test pic.twitter.com/yRPI8AgfDp
– Master (@master_s9) December 3, 2023
Download and try PsFree
Please note the disclaimer above as this is a very recent version and results may change at this point.
The easiest way to test the PSFree Webkit exploit is to point your PS4 or PS5’s web browser to the Zecoxao public host. https://zecoxao.github.io/psfree/
In general, to use your PS4/PS5 browser and redirect to this host, you need to use DNS that redirects playstation.net to the host. Master_s9 offers an alternative way to use the browser on PS5 as follows:
How to Open PS5 8.20 Web Browser pic.twitter.com/7nbrAa5qC7
– Master (@master_s9) December 3, 2023
Alternatively, if you want to host the exploit yourself, you can download it here. You need to set up your own host locally.
They are: celesteblu