According to GaryOpa over at max-console, it seems that TX has not given up on the hunt for an exploit that will work on these newly discovered ipatched Switch units. To be clear, these consoles still use the T210 chip that has the bootrom exploit (as also evidenced by the CVE in the model number), but have been patched at some point during manufacturing to not allow unsigned code to be sent during RCM via USB connection. As evidenced by the video earlier today, it would appear that the Switch Unit they were demoing was in fact not patched the entire time and are in need of legitimately patched units in order to continue rocking the Switch. They are even willing to pay for shipping and replace it with an exploitable unit! Well? What are you waiting for? Go out there, find those damn Switches, and send them TX's way!
How do you know if you found the Switch units they are looking for? Well, ipatched Switch units require more refined identifiers but with preliminary results, we do know a few things. So far, serial numbers is how we have identified them and they must fit the following criteria:
XAJ70043+
XAW70018+
Huh? What's that? You don't want to give TX your precious $300 paperweight? Hmm, there is another way. SciresM has demonstrated he has an exploit that works on the firmware these units ship with known as Deja Vu. This means if you want to guarantee any chance at hacking your Switch if it is indeed patched, DO NOT UPDATE! The following is an example of the exploit in action (for those who need their memory refreshed or think SciresM is standing on thin air)
Got some good news (sorry that it takes over a minute for the lennies): https://t.co/hGdPOchTVo
— Michael (@SciresM) February 16, 2018
Anyway, I would strongly recommend not updating when new firmwares release.
This information is ever evolving based on user reports and reputable hackers so please continue to stay tuned for updates in the Switch Firmware by Serial Number Thread
Source
Last edited by Draxzelex,