Thursday 21 March 2013

iOS 6.1.3 Found to Have Yet Another Lock Screen Passcode Bypass Glitch


iOS 6.1.3 was released yesterday to address numerous security holes, as well as improve the Maps application in Japan, and fix a lock screen vulnerability that could allow a user to bypass the lock screen passcode. 

Now it seems that the new iOS 6.1.3 release has just introduced yet another lock screen vulnerability allowing the user to bypass the lock screen passcode and have access to the victim's contacts, photos, call history, and more. The glitch involves using a tool to eject the SIM card, such as a SIM eject tool or paperclip, and using the voice dial feature:

Youtube Video 

For a mobile-friendly video link that works with our app, tap on the video link below:

Video Link

As soon as you eject the SIM card when the phone call is about to go through via voice dial, the iPhone won’t know what to do and the screen will go straight to the Phone application. From here, the victim’s personal information is freely available for viewing by the user.

As the video explains, disabling the voice dial feature from the Settings application can keep you protected from this glitch; alternatively, you can watch your iPhone like a hawk and make sure no one ever gets the chance to touch your iPhone except for you, but the former is definitely the most efficient way to keep yourself protected.

Apart from patching exploits used in the evasi0n iOS 6 untethered jailbreak, the additional lock screen vulnerability that came with a firmware update meant to fix another lock screen vulnerability is just yet another reason not to bother updating to the latest firmware.

No comments:

Post a Comment