Another iOS 6.1.x Passcode Vulnerability Found

We recently reported that there was a critical vulnerability in the iOS 6.1 which essentially allowed anyone to bypass the lockscreen security on an iPhone. Now, a similar bug has been found in iOS 6.1.x. Like the last bug, this new bug is also exploited by followed a few specific steps listed below.


iPhone passcode

Once you follow the steps listed below, you are easily able to bypass the lockscreen security without having to provide any passcode:

  1. Connect your iPhone with iTunes and the App Store to ensure that the lock screen functionality is enabled.
  2. Push the power button. iPhone will turn on and ask you for the passcode.
  3. Click on emergency call. Try to dial any emergency number and immediately cancel the call.
  4. Now push the power button and also push iPhone button.
  5. Keep the power button pressed for 3 seconds – during the third second, press the iPhone button as well as the emergency call button, all at the same time.
  6. Now remove your finger from the iPhone button and then from the power button – the display of the device will go black after this.
  7. Connect a USB plug with your iOS device while the screen is still black and voila! You are able to access content such as photos, videos and contacts without providing any passcode for the lockscreen.

The interesting part is that as far as the earlier passcode bug is concerned, Apple is apparently furnishing a patch for it in the upcoming iOS 6.1.3. The big question is, will the company will consider providing a patch for this freshly discovered bypass functionality?

Watch the video below to watch a hands-on demonstration of this bug.

Courtesy: Threat Post

[ttjad keyword=”iphone”]

Salman

Salman Latif is a software engineer with a specific interest in social media, big data and real-world solutions using the two.Other than that, he is a bit of a gypsy. He also writes in his own blog. You can find him on Google+ and Twitter .

Leave a Reply