Vulnerability Name: | CCN-82093 | ||||||
Published: | 2013-01-31 | ||||||
Updated: | 2013-01-31 | ||||||
Summary: | Apple iOS for iPhone could allow a local attacker to bypass security restrictions, caused by an implementation error when handling emergency calls. By clicking the sleep button during an emergency call, a local attacker could exploit this vulnerability to bypass the passcode lock feature and launch an application without entering the passcode. | ||||||
CVSS v3 Severity: | 5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
| ||||||
CVSS v2 Severity: | 3.6 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N) 2.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: APPLE-SA-2013-03-19-1 APPLE-SA-2013-03-19-1 iOS 6.1.3 Source: CCN Type: SA52173 Apple iOS for iPhone Emergency Call Sleep Button "Passcode Lock" Bypass Weakness Source: CCN Type: Apple Web site Apple Source: CCN Type: BID-57967 Apple iPhone Lock Screen Security Bypass Vulnerability Source: CCN Type: Youtube: videosdebarraquito How to Bypass iPhone 5 Passcode on iOS 6.1 / 6.0.2 / 6.0.1 . Prank your friends. Source: XF Type: UNKNOWN appleios-passcode-lock-security-bypass(82093) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |