Yet Another iPhone Lockscreen Bypass Bug Found In iOS 6.1.3

In the recent past, an iPhone lockscreen bypass bug was discovered which essentially let you access iPhone contacts and data without providing the lockscreen passcode. Apple just rolled out the iOS 6.1.3 update, which included a patch for the flaw. Unfortunately, yet another iPhone lockscreen bug has been found in iOS 6.1.3.


iPhone lockscreen

Apparently, lockscreen bugs on smartphones are lockscreen bypassing tricks by performing a definite set of steps. We had hoped that Apple may have patched the problem once and for all with its iOS 6.1.3 update. However, it appears that another, similar bug was found in the latest firmware within hours of its release.

The bug can be used to bypass the iPhone lockscreen, although it involves accomplishing a number of complicated steps to do so. Below is a list of steps that are required to entirely bypass the lockscreen on an iPhone running iOS 6.1.3.

  • Turn on Voice Control.
  • Now when you turn on the iPhone, you can make a voice-controlled call to an emergency number without first providing the lockscreen passcode. In the video below, the hacker who identified the flaw makes it to 123.
  • While the call is being dialed, eject the SIM tray.
  • That’s it. You are now able to access contacts and other data on the iPhone without providing any lockscreen passcode.

The easy way of securing yourself and your smartphone against this exploit is to turn off Voice Control on it. You can watch the video below for a clearer demonstration of the hack. Naturally, this may be a disappointment for Apple who dished out patches for former lockscreen bugs in the earlier version of the firmware with the release of iOS 6.1.3.

Source: YouTube

Courtesy: TNW

[ttjad keyword=”iphone”]

Salman

Salman Latif is a software engineer with a specific interest in social media, big data and real-world solutions using the two.Other than that, he is a bit of a gypsy. He also writes in his own blog. You can find him on Google+ and Twitter .

Leave a Reply