Another lockscreen bug that leads to vulnerability found in iOS 6.1

by Sana Usman on February 27, 2013

lockscreen bug

iOS 6.1 came under criticism after it was found that a lockscreen bug in the operating system grants limited access to user’s personal information even when the device is protected with a passcode. Now according to Vulnerability Lab CEO Benjamin Kunz Mejri, in iOS 6.1 there is a second passcode lock vulnerability.

Mejri has recently released some details to Full Disclosure list via email highlighting the vulnerability. Details show there’s another way to pass the lock screen and infringe into iOS user’s voicemails, contacts and other personal details.

Mejri has also stated that this bug is little different from the one underlined in the start of this month. Both get started in same way, they follow same pattern of steps that consume Emergency Call function along with the screenshot feature and lock or sleep button. So as to access the phone data, the attacker can dismiss the emergency call by holding the lock or sleep button.

The difference between the previous lockscreen bug and this one is how the iPhone’s display goes black, that let the hacker to get the iPhone device connected with computer through USB and access the data without putting himself in hassle of knowing PIN or passcode.

Mejri further said,

“The vulnerability is located in the main login module of the mobile iOS device (iPhone or iPad) when processing to use the screenshot function in combination with the emergency call and power (standby) button. The vulnerability allows the local attacker to bypass the code lock in iTunes and via USB when a black screen bug occurs. The vulnerability can be exploited by local attackers with physical device access without privileged iOS account or required user interaction. Successful exploitation of the vulnerability results in unauthorized device access and information disclosure.”

It is reported that the first iOS 6.1 lockscreen bug will be fixed in the upcoming update. Lets see how long it takes to fix this one. [Ars/image: TNW]

0saves
If you enjoyed this post then share it and tell us what you think by leaving a comment below.
Share

Previous post:

Next post: