• Your favorite

    Apple

    ,

    iPhone

    ,

    iPad

    ,

    iOS

    ,
    Jailbreak
    , and
    Cydia
    site.
  • iOS 6.1.3 Found to Have Yet Another Lock Screen Passcode Bypass Glitch


    iOS 6.1.3 was released yesterday to address numerous security holes, as well as improve the Maps application in Japan, and fix a lock screen vulnerability that could allow a user to bypass the lock screen passcode.

    Now it seems that the new iOS 6.1.3 release has just introduced yet another lock screen vulnerability allowing the user to bypass the lock screen passcode and have access to the victim's contacts, photos, call history, and more. The glitch involves using a tool to eject the SIM card, such as a SIM eject tool or paperclip, and using the voice dial feature:

    Youtube Video

    For a mobile-friendly video link that works with our app, tap on the video link below:

    Video Link

    As soon as you eject the SIM card when the phone call is about to go through via voice dial, the iPhone wonít know what to do and the screen will go straight to the Phone application. From here, the victimís personal information is freely available for viewing by the user.

    As the video explains, disabling the voice dial feature from the Settings application can keep you protected from this glitch; alternatively, you can watch your iPhone like a hawk and make sure no one ever gets the chance to touch your iPhone except for you, but the former is definitely the most efficient way to keep yourself protected.

    Apart from patching exploits used in the evasi0n iOS 6 untethered jailbreak, the additional lock screen vulnerability that came with a firmware update meant to fix another lock screen vulnerability is just yet another reason not to bother updating to the latest firmware.

    Sources: YouTube via iClarified
    This article was originally published in forum thread: iOS 6.1.3 Found to Have Yet Another Lock Screen Passcode Bypass Glitch started by Anthony Bouchard View original post
    Comments 36 Comments
    1. robby_persaud's Avatar
      robby_persaud -
      Where can i get ipsw 6.1.3 to download as torrent, everytime i try download it goes up to 75% or 90% n fail.

      Where can i download ipsw 6.1.3 torrent file, when i try downloading from here it goes up to 75% or 85% and then fails, Iphone was jailbroken, accidently update to 6.1.3 now stuck in recovery mode and cannot restore.
    1. slim.jim's Avatar
      slim.jim -
      Quote Originally Posted by robby_persaud View Post
      Where can i get ipsw 6.1.3 to download as torrent, everytime i try download it goes up to 75% or 90% n fail.

      Where can i download ipsw 6.1.3 torrent file, when i try downloading from here it goes up to 75% or 85% and then fails, Iphone was jailbroken, accidently update to 6.1.3 now stuck in recovery mode and cannot restore.
      Why do you need a torrent? 99% of the time you can find direct download links from apple posted online.

      http://iosdl.com/
    1. hackerd00d's Avatar
      hackerd00d -
      thats called a brick*

      check the urban dictionary for it.

      and how did you accidentally upgrade it?
    1. slim.jim's Avatar
      slim.jim -
      Quote Originally Posted by hackerd00d View Post
      thats called a brick*

      check the urban dictionary for it.

      and how did you accidentally upgrade it?
      That's not bricked. Bricked means its dead an there is no recovering the phone. Just do a DFU restore. I also never understand how you accidentally upgrade. iTunes ask you like 5 time if you are sure and then it still has to download a 300+ MB file before it starts the upgrade.
    1. holyshnikes's Avatar
      holyshnikes -
      Apple needs to dedicate two or three people to just sit all day and tinker with different stuff to try and bypass the lock screen.
    1. highboi's Avatar
      highboi -
      Quote Originally Posted by slim.jim View Post
      I think this is a lot more time than smarts. Jailbreaking requires developer knowledge and this is trial and error.
      People dont tray these weird things to find bugs, its all in the code, read the code. Know it well enough to point out "thats not right it can cause a security problem. And bingo a glich/bug /w/e u wanna call it is born

      Quote Originally Posted by Norb View Post
      ...and in other news, people have too much time.
      Or curios or just want to familiarize themselves with apple.
    1. Neil001's Avatar
      Neil001 -
      That's why u do not upgrade right away, why? This is to trick people into upgrade to 6.1.3 to "fix" the security flaw and loose their jailbreak...... I'm stayin on 6.0.1 until security is fixed and new jailbreak is release......
    1. steve-z17's Avatar
      steve-z17 -
      Does the person just have list of weird things to try one after the other to try and bypass the lockscreen?? I just don't see how you would think to try that combination of things to get past it! It boggles my mind how much time people spend on this! Unless Apple is paying you to do it....why would you want to??
    1. RyoSaeba's Avatar
      RyoSaeba -
      Quote Originally Posted by novadam View Post
      how do people figure this stuff out?
      To this day, I still have no idea how people figured out Up Up Down Down Left Right Left Right B A.

      Although I must admit I did figure the code for Ikari Warriors on Nintendo which I thought to be BBABBA but of course we all know it's just ABBA, but hey, it worked nonetheless.

      Also, just to add, how many people DO care if some stranger looks at your contacts of strangers? Oh damn, that thieve is gonna text my girl and ask her out on a date...
    1. Rawail's Avatar
      Rawail -
      I can't use my temple run 2 on jailbroken I device
    1. PoEtikly's Avatar
      PoEtikly -
      Quote Originally Posted by slim.jim View Post
      I think this is a lot more time than smarts. Jailbreaking requires developer knowledge and this is trial and error.
      Time? They figured this out in less than day of 6.1.3 being released. I wouldn't say time is the crucial factor here. Maybe pure dumb luck.
    1. HomerBoy's Avatar
      HomerBoy -
      There are some interesting ppl out there to figure out these 'glitches'...

      Too much time, not much work....
    1. slim.jim's Avatar
      slim.jim -
      Quote Originally Posted by PoEtikly View Post
      Time? They figured this out in less than day of 6.1.3 being released. I wouldn't say time is the crucial factor here. Maybe pure dumb luck.
      I think people are focused on trying to find ways to bypass the lock screen right now since the first one was discovered. I wouldn't be surprised if these methods would have worked all the way back since iOS 1.0.
    1. epiticus1's Avatar
      epiticus1 -
      I personally think that Apple is spending WAY too much time trying to patch the jailbreak that they miss major security issues and really make no outstanding improvements to their devices. Think about it...When was the last time you just couldn't wait for an Apple upgrade? And when was the last time you just couldn't wait to get your hands on that new iPhone that made you current iPhone look like ****?...that long huh. Yeah...me too. SUCKS
    1. Sage I's Avatar
      Sage I -
      Quote Originally Posted by RyoSaeba View Post
      To this day, I still have no idea how people figured out Up Up Down Down Left Right Left Right B A.
      Also: Up Up Down Down Left Right Left Right B A B A Select Start... That made Contra so much fun... What other games did that work on?

      Quote Originally Posted by Rawail View Post
      I can't use my temple run 2 on jailbroken I device
      Uhhhhhhhhh... I'm not sure what that has to do with the price of tea in china... A lil off topic buddy...
    1. Mannyphantom46's Avatar
      Mannyphantom46 -
      Wow! All that upgrade for nothing! Thanks god I kept 6.1,2
      Am still on JB. I don't use password lock at all. If I do use it. It because my son is playing with my phone. My son is only two and sometimes he does unlock it with the password on. So what new with 6.1.3 if a two years can unlock it with password on.