Contact Form


Once again, another Lock screen vulnerability has reared its ugly head, this one right on the heels of Apple’s 7.0.2 update to fix another vulnerability.

Dany Lisiansky has posted the steps on a YouTube video he recently uploaded, and we’ve verified that the steps, albeit a bit involved, do work.

If there’s one bright spot about this latest vulnerability, it is that it doesn’t expose anything outside of the Phone app to would be snoopers, and you can nix the bug by disabling Siri access from the Lock screen. Still, Apple’s security team can’t be happy about this.



You can test the bug out for yourself, as Lisiansky has outlined the steps in the video’s description:

Step 1: Make a phone call (with Siri / Voice Control)

Step 2: Click the FaceTime button

Step 3: When the FaceTime App appears, click the Sleep button

Step 4: Unlock the iPhone

Step 5: Answer and End the FaceTime call at the other end

Step 6: Wait a few seconds

Step 7: Done. You are now in the phone app

This might not seem like that big of a deal, but it’s a big flaw in my opinion. While it’s true that you can only use Siri to dial contacts, this bug allows anyone to see your entire list of contacts, your call history, even your voicemail.

It’s just another case of allowing users to do too much from the Lock screen. Of course, you can go into the Settings > General > Passcode & Fingerprint settings, and disable Siri access from the Lock screen until Apple fixes this issue.


What are your thoughts about Apple’s ongoing Lock screen security issues?


Data source: via iDB (By Jeff Benjamin)

Post a Comment

Previous Post Next Post