Vulnerability in iOS 10 allows access to photos and contacts to bypass lock screen [video]

IOS 10, now installed on most iPhone and iPad, found a very dangerous vulnerability that allows to gain unauthorized access to the data owner. An attacker can bypass the lock screen protected with password/fingerprint scan, and this will help the imperfection of the regular Clock app. In this case, the attacker does not need any special knowledge, just follow a combination of several simple actions.

Vulnerability in iOS 10 allows access to photos and contacts to bypass lock screen [video]

Vulnerability could possibly allow unauthorized users to obtain access to the photos owners. A loophole through which we can pass protect iOS, found project author EverythingApplePro. With a few simple steps, the attackers can get into the iMessage app, and from it to the photo library on the device.

The sequence consists of several steps that must be performed on the device before the attack. The gadget need to get in the disposal for a few seconds. Then you should open the Clock application, add a new alarm, go to sound, then the song selection. Here in the search bar how to write characters, to highlight them and press the “Share” button, then choose iMessage. Next, under iMessage in the “to” field need to write any set of characters, and you can turn off your iPhone and return it to the owner.

Vulnerability in iOS 10 allows access to photos and contacts to bypass lock screen [video]

Now the unsuspecting owner of the iPhone can use your gadget as long as the one who decided to carry out the attack, again will be at the disposal of the device. Now access your data even when your device is locked: just from the lock screen to call control and press the button of the Alarm clock. Opens a window in which you typed at the first stage, the symbols will turn into a subscriber. Make a few clicks to open a new user card, click “Create new contact” and then Photos> Choose photo. Thus, the user is able to view photographs and contacts located in the memory of another iPhone.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *