There are plenty of sandbox escapes that don't rely on JIT, and IE doesn't have a particularly strong sandbox anyway. I mean, it's ok, it's just not great. My first idea would be to try to exploit their HTML5 video code.
Edit: Seems I wasn't the only one with this idea. Proof of concept in Firefox: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8643
Ok, I assume it's just on my end, but that link you're posting isn't loading correctly for me. All I can see is "Vulnerability Summary for CVE-2014-8643". Anyway, I'm just going to assume that somewhere along the way that that exploit relies on Win32. Would I be correct? Would I also be correct in assuming that somewhere along the way it relies on a file download? If so, then once again the exploit is kind of useless. The Xbox app platform just doesn't run Win32 code (at least not in the traditional sense). The browser on the XB1 also point blank refuses to download any file whatsoever. So again, bearing in mind I can't view the details of this exploit, I have no idea how this code would even be able run in the first place.