Brief description: what can be done after bypassing is limited,
Only dare to set the level to "medium", but the actual harm to users may be higher
Details: The vulnerability lies in the Voice Control function of the iPhone,
When the screen Lock password is set and the screen lock is locked,
This function can still be used when it is set by default.
Vulnerability proof: 1. Set the screen Lock password (set-> General-> password lock)
2. Turn off the screen and open it again. You will find that you need a password to perform other operations.
(Fun)
3. Press the home Key for more than 3 seconds to display the voice control interface.
4. At this time, you can use voice (the Chinese version is "Call xxx", and the E version is "Call XXX") to operate functions such as phone Call and music playback of the iphone.
5. When calling out the phone, you can view the contact and other operations, and the information will be leaked. Wow!
The password lock is basically displayed!
Solution: Disable the voice function when the keyboard lock is enabled. Or let apple improve its design.
Author: Network knight @ wooyun