iOS 13 ships with known lockscreen bypass flaw that exposes contacts

iOS 13 ships with known lockscreen bypass flaw that exposes contacts

5 years ago
Anonymous $MUlyiGRWxa

https://arstechnica.com/information-technology/2019/09/ios-13-ships-with-known-lockscreen-bypass-flaw-that-exposes-contacts/

Apple released iOS 13 with a bunch of new features. But it also released the new OS with something else: a bug disclosed seven days ago that exposes contact details without requiring a passcode or biometric identification first.

Independent researcher Jose Rodriguez published a video demonstration of the flaw exactly one week ago. It can be exploited by receiving a FaceTime call and then using the voiceover feature from Siri to access the contact list. From there, an unauthorized person could get names, phone numbers, email addresses, and any other information stored in the phone’s contacts list.

iOS 13 ships with known lockscreen bypass flaw that exposes contacts

Sep 20, 2019, 7:14pm UTC
https://arstechnica.com/information-technology/2019/09/ios-13-ships-with-known-lockscreen-bypass-flaw-that-exposes-contacts/ > Apple released iOS 13 with a bunch of new features. But it also released the new OS with something else: a bug disclosed seven days ago that exposes contact details without requiring a passcode or biometric identification first. > Independent researcher Jose Rodriguez published a video demonstration of the flaw exactly one week ago. It can be exploited by receiving a FaceTime call and then using the voiceover feature from Siri to access the contact list. From there, an unauthorized person could get names, phone numbers, email addresses, and any other information stored in the phone’s contacts list.