iOS 6.1 bug allows user to bypass Lockscreen security code

iOS 6.1 has been pretty much a nightmare for Apple and its users. It has had a lot of connections issues, syncing issues, battery issues and so on and so forth. And now there's a pretty big security issue that has just surfaced.

Users can now bypass a Lockscreen code by simply using a rather straightforward sequence of buttons. As you can see in the video above the whole process is done in a few seconds and it gives users access to a lot of areas of the phone including: the Phone app, Contacts, voicemail and even pictures.

All you have to do is pretend to turn the phone off, cancel and emergency call then press the on/off button a few times. This lets you bypass the security code and use the full Phone app. From there you have access to the adress book, and the pictures app by trying to change a contacts picture.

Of course this isn't the first time such a bug has been discovered. A very similar one popped up in iOS 4.1 and was fixed with a later update. Apple has yet to comment on this new bug but it is very likely they will be releasing a fix quite soon.

Source: Gizmodo

Report a problem with article
Previous Story

Editorial: Microsoft has nothing to fear

Next Story

Microsoft exec says consumers won't know about Playstation 4 launch

35 Comments

Commenting is disabled on this article.

So it really just allows you to bypass security and dial number... I was totally expecting to bypass security..and see home screen.. oh well

ashpowell said,
Although I'm not a fan of Apple, who really would figure that out without watching these videos?

It's not normal people that want to figure this out. Now that this is out there, stolen devices can now rake up massive phone bills for the person who owns the phone

jasonon said,
these silly bypasses are always gonna be there
Find this silly bypass on your windows machine. They will be there as long as the implemenation is terrible.

Because it requires the use of the phone pad in order to make an emergency call. Since the ipod and ipad don't have the capabilities built in then this doesn't effect them.

I'm just wondering how someone gets the idea using this kinda keystrokes, on and off switches, standby states to get bypassed the security lock - and gets to reproduce it...

I mean get a life.

But always nice to have these sorts of "freaks" go get to know - and solve - some bugs in any piece of software.

kiddingguy said,
I'm just wondering how someone gets the idea using this kinda keystrokes, on and off switches, standby states to get bypassed the security lock - and gets to reproduce it...

I mean get a life.

But always nice to have these sorts of "freaks" go get to know - and solve - some bugs in any piece of software.

I believe they're called QA Engineers. I work as one; we are paid to find these strange quirks in software so people like you don't. Not sure how we are "freaks" but hey if that's what gets you off

kiddingguy said,
I'm just wondering how someone gets the idea using this kinda keystrokes, on and off switches, standby states to get bypassed the security lock - and gets to reproduce it...

I mean get a life.

But always nice to have these sorts of "freaks" go get to know - and solve - some bugs in any piece of software.

You tell them to "get a life" and then say what they're doing is a good thing? Didn't get your morning dose of insulting others?

jamieakers said,

I believe they're called QA Engineers. I work as one; we are paid to find these strange quirks in software so people like you don't. Not sure how we are "freaks" but hey if that's what gets you off

By freaks I mean people looking and trying -endlessy- for these kind of behaviour and software bugs. I'm glad you guys are there, don't get me wrong. I guess it''s not just my cup of tea to find all of this in software

kiddingguy said,
I'm just wondering how someone gets the idea using this kinda keystrokes, on and off switches, standby states to get bypassed the security lock - and gets to reproduce it...

I mean get a life.

But always nice to have these sorts of "freaks" go get to know - and solve - some bugs in any piece of software.

Wow. What a ****ty comment. Anyways I would assume most of this things happen by pure accident.

Apple needs to make a lockscreen that isn't merely a cosmetic overlay that can be thwarted by animation tricks and cheap hacks. It needs to be something akin to the Windows secure desktop, where nothing can run over it.

Didn't the iPad one require a magnet to use the mag lock/unlock feature of the case to unlock the tablet. Or was that another one?

scorpian007 said,
Yet the media won't make a big deal out of this because it's Apple. If it were Microsoft, everyone would be up in arms.

Don't hate makes you look silly

TurboShrimp said,

Don't hate makes you look silly

silly? it's true, if a MS patch comes out that is a vulnerability that might be exploited now the media jumps all over it, I haven't seen any of these apple exploits / issues in the news yet

scorpian007 said,
Yet the media won't make a big deal out of this because it's Apple. If it were Microsoft, everyone would be up in arms.

So I guess the whole iOS Maps didnt make the news huh? Or the latest Exchange issue didnt make the news either.

This issue probably wont be a big deal since you need to actually have the phone in order to break into it.

techbeck said,

This issue probably wont be a big deal since you need to actually have the phone in order to break into it.

Wow, that is a pretty low standard for security. Having said that, the person was able to make a phone call with the device, I didn't see him access any other information stored on the phone. I am not saying it is nothing, but that isn't exactly "bypassing the lock screen." It is making a call while the phone is locked, pretty big differance.

techbeck said,

So I guess the whole iOS Maps didnt make the news huh? Or the latest Exchange issue didnt make the news either.

This issue probably wont be a big deal since you need to actually have the phone in order to break into it.


Whole Exchange issue? The most common reaction was it must be an Microsoft/Exchange bug.