Complex Passcode Bypass Method Exposes iPhone Contacts and Photos in iOS 12

A passcode bypass vulnerability has been discovered in iOS 12 that potentially allows an attacker to access photos and contact details on a locked iPhone.

The rather convoluted bypass method was shared in a video by Jose Rodriguez, who has discovered iOS bugs in the past that Apple has subsequently fixed.


With physical access to the locked device, the attacker first asks Siri to activate VoiceOver, sleeps the device with the Side button, and then calls the iPhone using another device. Once the call screen shows up, the attacker taps the Message button, opts to create a custom message, and then taps the plus (+) icon in the top right.

Next, on the other phone, the attacker sends a text or iMessage to the target iPhone, whose screen is then double-tapped when the message notification appears. This causes an odd behavior in the UI, since it highlights the plus icon underneath.

After a short wait, the screen goes white and the notification disappears, but the VoiceOver's text selection box is apparently still tappable and can now be used to access the Messages interface. Following multiple screen swipes, the VoiceOver is heard to say "Cancel," which reveals the original Messages screen.


Adding a new recipient to the message and selecting a numeral from the virtual keyboard then reveals a list of recently dialed or received phone numbers and contacts. Further, if one of the numbers or contacts includes an info ("i") button, disabling VoiceOver and tapping the button shows the contact's information. Performing a 3D Touch action on the contact also brings up call and message options, along with options to Add to Existing Contact or Create New Contact.

In a similarly complicated set of steps involving an invisible user menu, an attacker can eventually access a locked iPhone's Camera Roll and other photo folders, which can then be used to add profile pictures to contact cards.

The bypass methods work on all iPhones including the iPhone XS lineup, but Apple doesn't appear to have fixed the vulnerabilities in the latest iOS 12.1 beta. Thankfully however, all of the above can be easily prevented by disabling access to Siri from the lock screen.

Concerned users can do so by navigating to Settings > Face ID & Passcode (that's Settings > Touch ID & Passcode on iPhones with Touch ID) and disabling the Siri toggle under the "Allow access when locked" menu.



Top Rated Comments

(View all)
Avatar
3 weeks ago
How do they find out something like this?? :)
Rating: 39 Votes
Avatar
3 weeks ago

Youtuber EverythingApplePro reported that it was found by a taxi driver who tries to discover bugs like this on his iPhone while waiting for passengers.


He's also famous for being the taxi driver who has one customer every 10 years.
Rating: 24 Votes
Avatar
3 weeks ago
Hats off to hackers and security people that have much more patient for minutiae than me.
Rating: 13 Votes
Avatar
3 weeks ago

How do they find out something like this?? :)

Surely this must have been discovered in some reverse-engineering of iOS. How else would you ever find this.

Youtuber EverythingApplePro reported that it was found by a taxi driver who tries to discover bugs like this on his iPhone while waiting for passengers.
Rating: 12 Votes
Avatar
3 weeks ago

Why in the world do people have Siri enabled on the lock screen in the first place? The only thing worse would be the truly clueless who enable control center on the lock screen.


So when I’m cooking, I can just yell “Hey Siri, set a timer for 2 and one-half minutes!” and not be bothered by picking it up.

Or when I’m driving, just say “Hey Siri, tell dad I’ll be there in five minutes.” Since Apple doesn’t feel it can leave iPhone on while plugged in listening to music.

Now, serious question, what’s wrong with Control Center being enabled on lock screen?
Rating: 12 Votes
Avatar
3 weeks ago

Why in the world do people have Siri enabled on the lock screen in the first place? The only thing worse would be the truly clueless who enable control center on the lock screen.

Helps in various situations like calling or doing something while driving, or jogging or something else of that nature.
Rating: 9 Votes
Avatar
3 weeks ago
Up, up, down, down, left, right, A, B, A makes the headphone jack reappear.
Rating: 9 Votes
Avatar
3 weeks ago

Here's a basic one. If Control Center is enabled on the lock screen, I can put your phone into airplane mode when I steal it.


It doesn’t matter, if that person was smart and enabled all the security features with the phone and iCloud you’ve basically stole a paperweight anyway
Rating: 7 Votes
Avatar
3 weeks ago
Surely this must have been discovered in some reverse-engineering of iOS. How else would you ever find this.
Rating: 6 Votes
Avatar
3 weeks ago
If a bored guy sitting in a Taxi can find vulnerabilities like this, gotta wonder what government sponsored hacking professionals have found but kept quiet.
Rating: 6 Votes
[ Read All Comments ]