Newly Discovered Lock Screen Passcode Bypass Flaw affects iPhones 5, 6, and iPad 2. A security researcher has discovered a new flaw that can allow an attacker to quickly bypass iPhone and iPad lock screens even if it’s secured with a passcode. This new lock screen passcode bypass flaw affects iPhone 5, iPhone 6 and iPad 2 running iOS 8.2 or iOS 9. It’s unclear if this “high-rated” flaw affects other iOS devices and those running on much newer versions of iOS.
This flaw isn’t exactly a new discovery since similar flaws have been discovered in previous versions of iOS; however, Apple is usually quick to fix them by way of an over-the-air firmware update.
Apple’s most recent figures show that the vast majority of iPhone and iPad users are running an affected version of the software, accounting to many tens of millions of users.
Security researcher, Benjamin Kunz Mejri who discovered the flaw posted a proof-of-concept video on Facebook of the attack taking place. To perform a time-based attack to bypass the passcode, an attacker needs to have physical access to the device.
Mejri said that a “local attacker can trick the iOS device into a mode where a runtime issue with unlimited loop occurs. This finally results in a temporarily deactivation of the passcode lock screen.”
The researcher says that he informed Apple’s security team about this exploit on October 22nd 2015. It’s not exactly clear why the flaw was publicly disclosed now. Apple has still not released a fix, which leaves your iPhones vulnerable. It is possible that the bug could be patched by Apple in the upcoming iOS 9.3.
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.