iPhone Vulnerability Makes It Easy to Access Your Pin Protected Data

A data protection vulnerability has been discovered with non-jailbroken pin protected 3GS iPhones that bypasses authentication and accesses data

The vulnerability was discovered by Bernd Marienfeldt and applies to various firmware versions.

This data protection flaw exposes music, photos, videos, podcasts, voice recordings, Google safe browsing database, game contents… by in my opinion the quickest compromising read/write access discovered so far, without leaving any track record by the attacker. It’s about to imagine how many enterprises (e.g. Fortune 100) actually do rely on the expectation that their iPhone 3GS’s whole content is protected by encryption with an PIN code based authentication in place to unlock it.

The contents sample have been collected off a non jail broken iPhone 3GS (with latest iPhone OS installed, all apps fully up to date and immediately PIN lock enabled) by simply connecting it powered off via USB to a Linux Lucid Lynx PC (10.04) and then switched back on – being automatically mounted with given insecurity and never been attached to the PC before.

Merienfeldt believes the allowed write access could also lead into triggering a buffer overflow. Apple thinks they understand why this can happen but cannot provide timing or further details on the release of a fix.

Read More [via Robert]


 iPhone © 2012 | Designed by LogosDatabase.com, in collaboration with Credit Card Machines, Corporate Headquarters and Motivational Quotes