New lockscreen bypass bug found on iPhone 6s, iPhone 6s Plus | HT Tech

New lockscreen bypass bug found on iPhone 6s, iPhone 6s Plus

A lock screen bypass vulnerability has been found on the iPhone 6s, iPhone 6S Plus, which gives unprecedented access to contacts and photos

By: HT CORRESPONDENT
| Updated on: Apr 05 2016, 13:44 IST
image caption
A lock screen bypass vulnerability has been found on the iPhone 6s, iPhone 6S Plus, which gives unprecedented access to contacts and photos. (Reuters)

Apple's date with iPhone bugs seems to be long from over, as a new lock screen bypass vulnerability was discovered that gives anyone access to contact and photo albums on iPhone 6s and iPhone 6s Plus without unlocking the smartphones with a passcode or via the Touch ID fingerprint scanner.

The bug was first noticed by YouTube user named Videosdebarraquito, who in a video showed that the particular vulnerability allows a user to access contacts and photo albums of the iPhone 6s or iPhone 6s Plus without unlocking the device.

You may be interested in

MobilesTablets Laptops
7% OFF
Apple iPhone 15 Pro Max
  • Black Titanium
  • 8 GB RAM
  • 256 GB Storage
23% OFF
Samsung Galaxy S23 Ultra 5G
  • Green
  • 12 GB RAM
  • 256 GB Storage
Google Pixel 8 Pro
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage

Under normal circumstances, iOS and Android operating systems restrict the user from accessing several features on a smartphone, while the screen is locked except for dialling an emergency number or the camera. An iPhone user, for instance, can access the camera but cannot check the photo album or access contacts. However, the screen bypass vulnerability takes advantage of unauthenticated access to Siri via the lock screen and its access to contacts and photos.

Also read
Looking for a smartphone? To check mobile finder click here.

To take advantage of the flaw, a user is required to first activate Siri by either using the home button or hands-free voice command and search for Twitter. To complete the hack, the user needs to search for "@gmail.com" or a domain name of any other email service with the "@" prefix, which returns a list of results.

From here onwards, a user needs to click the tweet button and then via the 3D Touch of the iPhone 6s and iPhone 6s Plus, click on the given email address and wait till the pop-up notification appears. Users will see an "Add new contact" button after the pop-up window appears, which they will have to click to get access to all photos on the device. In a similar way, clicking on "Add to existing contact" will give you access to contacts.

The vulnerability detailed above at times requires several attempts before Siri eventually searches Twitter for an email address. According to a report by Daily Dot, this only works for iPhone models running iOS 9 and above through to iOS 9.3.1 with 3D Touch functionality.

Before Apple officially fixes the bug, users can prevent unauthorised access to their photos and contacts by tweaking a few settings. For instance, disabling Siri access to photos will restrict anyone from checking photos. To do so, just head over to Settings > Privacy > Photos and then disable Siri.

Another way is by disabling Siri on the lock screen, which shields the device from anyone trying to exploit the bug. Just go to Settings > Touch ID & Passcode and then disable Siri.

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on Whatsapp channel,Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 05 Apr, 13:41 IST
NEXT ARTICLE BEGINS