• Your favorite

    Apple

    ,

    iPhone

    ,

    iPad

    ,

    iOS

    ,
    Jailbreak
    , and
    Cydia
    site.
  • iOS 6.1.3 Found to Have Yet Another Lock Screen Passcode Bypass Glitch


    iOS 6.1.3 was released yesterday to address numerous security holes, as well as improve the Maps application in Japan, and fix a lock screen vulnerability that could allow a user to bypass the lock screen passcode.

    Now it seems that the new iOS 6.1.3 release has just introduced yet another lock screen vulnerability allowing the user to bypass the lock screen passcode and have access to the victim's contacts, photos, call history, and more. The glitch involves using a tool to eject the SIM card, such as a SIM eject tool or paperclip, and using the voice dial feature:

    Youtube Video

    For a mobile-friendly video link that works with our app, tap on the video link below:

    Video Link

    As soon as you eject the SIM card when the phone call is about to go through via voice dial, the iPhone wonít know what to do and the screen will go straight to the Phone application. From here, the victimís personal information is freely available for viewing by the user.

    As the video explains, disabling the voice dial feature from the Settings application can keep you protected from this glitch; alternatively, you can watch your iPhone like a hawk and make sure no one ever gets the chance to touch your iPhone except for you, but the former is definitely the most efficient way to keep yourself protected.

    Apart from patching exploits used in the evasi0n iOS 6 untethered jailbreak, the additional lock screen vulnerability that came with a firmware update meant to fix another lock screen vulnerability is just yet another reason not to bother updating to the latest firmware.

    Sources: YouTube via iClarified
    This article was originally published in forum thread: iOS 6.1.3 Found to Have Yet Another Lock Screen Passcode Bypass Glitch started by Anthony Bouchard View original post
    Comments 36 Comments
    1. IChi1d's Avatar
      IChi1d -
      Heh.
    1. novadam's Avatar
      novadam -
      how do people figure this stuff out?
    1. Perceptum's Avatar
      Perceptum -
      Quote Originally Posted by novadam View Post
      how do people figure this stuff out?
      I have no bloody clue!
    1. rvance's Avatar
      rvance -
      Quote Originally Posted by novadam View Post
      how do people figure this stuff out?
      +1 yes, please explain!!
    1. slim.jim's Avatar
      slim.jim -
      I never have voice dial enabled on the lock screen anyways.
    1. 2k1's Avatar
      2k1 -
      Quote Originally Posted by novadam View Post
      how do people figure this stuff out?
      Same thing how they jailbreak phones. Time and alot of smarts lol
    1. slim.jim's Avatar
      slim.jim -
      Quote Originally Posted by 2k1 View Post
      Same thing how they jailbreak phones. Time and alot of smarts lol
      I think this is a lot more time than smarts. Jailbreaking requires developer knowledge and this is trial and error.
    1. MPS3's Avatar
      MPS3 -
      ^^^ this is what happens when you got more time then you know what to do with
    1. tridley68's Avatar
      tridley68 -
      Quote Originally Posted by IChi1d View Post
      Heh.
      Crap i just updated all my work stuff yesterday .
    1. nealh's Avatar
      nealh -
      Just remember though Apple is more safe with their firmware and jailbreaking is bad. The reason it's bad is because it causes security problems. Laughing my *** off
    1. jamesgunaca's Avatar
      jamesgunaca -
      Hope we didn't just burn another exploit by pointing this out...but other than that seems like NBD.
    1. littlelisa63's Avatar
      littlelisa63 -
      Typical apple to fix a vulnerability and release a new one anything to spoil the jailbreak...bas****s
    1. Norb's Avatar
      Norb -
      ...and in other news, people have too much time.
    1. feidhlim1986's Avatar
      feidhlim1986 -
      Wasn't Schiller blabbering on about security recently...
    1. GenesisDH's Avatar
      GenesisDH -
      It seems it only works if Voice Control is enabled and Siri is not...
      So really it's not a usable exploit for anything above a 4, as Siri takes over in the cases of the 4S/5 and related iOS devices.
    1. Reymago23's Avatar
      Reymago23 -
      Apple cant get it right!
      what a pity!
    1. ecd5000's Avatar
      ecd5000 -
      Quote Originally Posted by novadam View Post
      how do people figure this stuff out?
      My thoughts exactly
    1. slim.jim's Avatar
      slim.jim -
      Quote Originally Posted by GenesisDH View Post
      It seems it only works if Voice Control is enabled and Siri is not...
      So really it's not a usable exploit for anything above a 4, as Siri takes over in the cases of the 4S/5 and related iOS devices.
      You also have to know a contacts name, while that might not be hard to figure out.
    1. ThatOneProfile's Avatar
      ThatOneProfile -
      Quote Originally Posted by novadam View Post
      how do people figure this stuff out?
      The same way Jailbreaks are made? Looking for vulns.
    1. Eonhpi's Avatar
      Eonhpi -
      Thanks again for reveling this to the public