- Mac News
Feb 25, 2013 03:29 PM
Researchers find second iOS 6.1 lockscreen bypass
Another lockscreen bypass vulnerability has been discovered in iOS 6.1, says Vulnerability Lab CEO Benjamin Kunz Mejri. The <a href="http://arstechnica.com/apple/2013/02/researchers-find-yet-another-way-to-get-around-ios-6-1-passcode/">second</a> is similar to the <A href="http://www.electronista.com/articles/13/02/14/not.first.instance.of.lockscreen.glitch/">first one</a>, in that it involves iOS' Emergency Call feature. "The vulnerability is located in the main login module of the mobile iOS device (iPhone or iPad) when processing to use the screenshot function in combination with the emergency call and power (standby) button," Mejri writes. "The vulnerability allows the local attacker to bypass the code lock in iTunes and via USB when a black screen bug occurs."<br /><br />The bypass could potentially allow someone with a stolen device to pull contacts, voicemail, and/or other content off of it. It's unknown if the <A href="http://www.macnn.com/articles/13/02/21/first.beta.was.actually.611/">iOS 6.1.3 beta</a> fixes the new exploit; while dealing with the same general problem, v6.1.3 may or may not solve a fundamental bug.
|All times are GMT -5. The time now is 11:52 AM.
Copyright © 2005-2007 MacNN. All rights reserved.
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2013, vBulletin Solutions, Inc.
Content Relevant URLs by vBSEO