First published: Sat Nov 03 2012(Updated: )
The Passcode Lock implementation in Apple iOS before 6.0.1 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement and access Passbook passes via unspecified vectors.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <=6.0 | |
Apple iPhone OS | =1.0.0 | |
Apple iPhone OS | =1.0.1 | |
Apple iPhone OS | =1.0.2 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.1 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =2.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1.1 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2.1 | |
Apple iPhone OS | =3.0 | |
Apple iPhone OS | =3.0.1 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =3.1.2 | |
Apple iPhone OS | =3.1.3 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.2.2 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.0.2 | |
Apple iPhone OS | =4.1 | |
Apple iPhone OS | =4.2.1 | |
Apple iPhone OS | =4.2.5 | |
Apple iPhone OS | =4.2.8 | |
Apple iPhone OS | =4.3.0 | |
Apple iPhone OS | =4.3.1 | |
Apple iPhone OS | =4.3.2 | |
Apple iPhone OS | =4.3.3 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.