Your favorite Apple, iPhone, iPad, iOS, Jailbreak, and Cydia site.
03-20-2013, 01:34 PM #1
iOS 6.1.3 Found to Have Yet Another Lock Screen Passcode Bypass Glitch
iOS 6.1.3 was released yesterday to address numerous security holes, as well as improve the Maps application in Japan, and fix a lock screen vulnerability that could allow a user to bypass the lock screen passcode.
Now it seems that the new iOS 6.1.3 release has just introduced yet another lock screen vulnerability allowing the user to bypass the lock screen passcode and have access to the victim's contacts, photos, call history, and more. The glitch involves using a tool to eject the SIM card, such as a SIM eject tool or paperclip, and using the voice dial feature:
For a mobile-friendly video link that works with our app, tap on the video link below:
As soon as you eject the SIM card when the phone call is about to go through via voice dial, the iPhone won’t know what to do and the screen will go straight to the Phone application. From here, the victim’s personal information is freely available for viewing by the user.
As the video explains, disabling the voice dial feature from the Settings application can keep you protected from this glitch; alternatively, you can watch your iPhone like a hawk and make sure no one ever gets the chance to touch your iPhone except for you, but the former is definitely the most efficient way to keep yourself protected.
Apart from patching exploits used in the evasi0n iOS 6 untethered jailbreak, the additional lock screen vulnerability that came with a firmware update meant to fix another lock screen vulnerability is just yet another reason not to bother updating to the latest firmware.
Sources: YouTube via iClarified
Last edited by Anthony Bouchard; 03-20-2013 at 01:44 PM.
03-20-2013, 01:41 PM #2
03-20-2013, 01:44 PM #3
how do people figure this stuff out?
03-20-2013, 01:48 PM #4
03-20-2013, 01:51 PM #5
03-20-2013, 02:03 PM #6
I never have voice dial enabled on the lock screen anyways.
03-20-2013, 02:06 PM #7
03-20-2013, 02:17 PM #8
03-20-2013, 02:24 PM #9
^^^ this is what happens when you got more time then you know what to do with
03-20-2013, 02:40 PM #10
03-20-2013, 02:49 PM #11
Just remember though Apple is more safe with their firmware and jailbreaking is bad. The reason it's bad is because it causes security problems. Laughing my *** off
03-20-2013, 03:14 PM #12
Hope we didn't just burn another exploit by pointing this out...but other than that seems like NBD.Using and jailbreaking iPhones since 2007.
03-20-2013, 03:43 PM #13
Typical apple to fix a vulnerability and release a new one anything to spoil the jailbreak...bas****s
03-20-2013, 04:06 PM #14
...and in other news, people have too much time.
03-20-2013, 04:37 PM #15
Wasn't Schiller blabbering on about security recently...
03-20-2013, 04:39 PM #16
It seems it only works if Voice Control is enabled and Siri is not...
So really it's not a usable exploit for anything above a 4, as Siri takes over in the cases of the 4S/5 and related iOS devices.Member of the hackint0sh forums.
HowardForums Member: Haas_Dave
03-20-2013, 05:34 PM #17boo
Apple cant get it right!
what a pity!
03-20-2013, 05:52 PM #18
03-20-2013, 06:00 PM #19
03-20-2013, 06:42 PM #20