Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

Apple says software update coming to fix iOS 6.1 passcode vulnerability

Last updated

Following quickly after news emerged of an iOS passcode bypass exploit, Apple has given word that it will be releasing a software update to repair the vulnerability.

AllThingsD carried word today from Apple spokeswoman Trudy muller that the iPhone maker is working on a solution to the issue.

"Apple takes user security very seriously," Muller said. "We are aware of this issue and will deliver a fix in a future software update."

Muller gave no details on when such an update might be released.

News of the exploit broke yesterday when JailBreak Nation posted a step-by-step guide to bypassing iOS 6.1's passcode lock feature. The vulnerability is nearly identical to one that appeared in October of 2010.

Using the bypass process allows one to view and modify contacts, listen to voicemail, and browse a user's photos. It does not appear, however, to grant access to email or the web.



9 Comments

gadgetcanada 12 Years · 423 comments

They may fix that hole, but there's always another one:

Tap, Tap, spin, clap your hands, stick your finger in your ear, stand on one foot. Press the lock button 5 times, turn the phone upside, hold the phone the "correct way" once then hold it "incorrectly" immediately following for 3 seconds. Stomp your feet 4 times and yodel to the moon.

 

Seriously, who stays up all night trying to find these weird exploits?

waybacmac 12 Years · 309 comments

Quote:
Originally Posted by AppleInsider 

"Apple takes user security very seriously," Muller said. "We are aware of this issue and will deliver a fix in a future software update."

 

In the meantime, not forgetting your iPhone at the bar is an effective preventive measure.

tribalogical 21 Years · 1182 comments

I know, right? Seriously... when I read through the multi-step "method" of achieving this "exploit", I laughed out loud... especially when I got to the last step which basically says "whatever you do don't release the sleep button"... so the access lasts only as long as you are physically pressing the sleep button...? How useful! I suppose there is the remote possibility of a corporate competitor getting their hands on an employee's phone and conjuring this 'exploit' from memory… all for limited access to a contact list, photos or voicemail? haha… joke's on the one doing the 'hack'... That said, it's so arcane I'm not sure I could successfully get through it even with the instructions right in front of me... How on EARTH did anyone 'discover' this in the first place...?

geekdad 15 Years · 1126 comments

Quote:
Originally Posted by waybacmac 

 

In the meantime, not forgetting your iPhone at the bar is an effective preventive measure.

That was funny...hmmm no one has found an iPhone 6 yet.....