Just days after Apple was found to have seeded iOS 6.1.3 (Beta 2) to developers, (an update which was said to include fixes for a – potentially serious – passcode security flaw), our friends at Arstechnica have this week highlighted yet another way in which Apple’s iOS passcode lockscreen can currently be bypassed.
The flaw, which is said to affect devices running iOS 6.1 (or later), uses the screenshot function found in iOS, “in combination with the emergency call and power (standby) button.”
“The vulnerability allows the local attacker to bypass the code lock in iTunes and via USB when a black screen bug occurs,” Mejri wrote. “[It] can be exploited by local attackers with physical device access without privileged iOS account or required user interaction. Successful exploitation of the vulnerability results in unauthorized device access and information disclosure.”
Considering iOS 6.1.3 is still in its “beta” stages, common logic would indicate that Apple will likely also include a fix for this latest found security flaw in the software, before it’s eventual public release.
This, however, has not been confirmed by the company at this time.