Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.
While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
Uh, there was nothing new or startling in the #Vault7 dump. Edward Snowden released the same information back in 2013. That exploit would only work on iPhones up to the 3Gs and has been closed since September of 2010. It won't work on any iPhone since the iPhone 4. . . and the iPhones' security model has been radically changed with the iPhone 5S model onward which does not permit such an attack. Sorry. Nice try.
Modern iPhones have four, inter-registered ICs that if modified in any way, will block the booting of the iPhone. That includes inserting non-authorized code. Remove or modify any one and the registration has to be re-newed by Apple in each of the four specific ICs so that they will work together again. This is what was giving rise the "Error 53" issues with people who had replaced the screen with a non-Apple version that did not have an Apple TouchID button. . . or just disconnected the Apple one.
Beacon’s hole was plugged several years ago... nice try.