iOS Passcode Bypass Vulnerability
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
Typically, iOS will lock a device if 10 incorrect passcodes are entered and can be configured to erase the device's contents. When passcodes were entered as one concatenated string on a physical keyboard connected through the Lightning port; not all passcodes would be passed to the device's secure enclave for validation. This happens as the keyboard input routine is prioritised over the data erasure routine.
This can result in a local attacker being able to brute-force attack a targeted device to gain access, whilst bypassing the data erasure feature.
Remediation steps
Last edited: 17 February 2020 12:45 pm