First published: Wed Mar 20 2013(Updated: )
The Passcode Lock implementation in Apple iOS before 6.1.3 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement by leveraging an error in the emergency-call feature.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <=6.1.2 | |
Apple iPhone OS | =1.0.0 | |
Apple iPhone OS | =1.0.1 | |
Apple iPhone OS | =1.0.2 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.1 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =2.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1.1 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2.1 | |
Apple iPhone OS | =2.2.1 | |
Apple iPhone OS | =3.0 | |
Apple iPhone OS | =3.0 | |
Apple iPhone OS | =3.0.1 | |
Apple iPhone OS | =3.0.1 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =3.1.2 | |
Apple iPhone OS | =3.1.2 | |
Apple iPhone OS | =3.1.3 | |
Apple iPhone OS | =3.1.3 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.2.2 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.0.2 | |
Apple iPhone OS | =4.1 | |
Apple iPhone OS | =4.2.1 | |
Apple iPhone OS | =4.2.5 | |
Apple iPhone OS | =4.2.8 | |
Apple iPhone OS | =4.3.0 | |
Apple iPhone OS | =4.3.1 | |
Apple iPhone OS | =4.3.2 | |
Apple iPhone OS | =4.3.3 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.1 | |
Apple iPhone OS | =5.1.1 | |
Apple iPhone OS | =6.0 | |
Apple iPhone OS | =6.0.1 | |
Apple iPhone OS | =6.0.2 | |
Apple iPhone OS | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0980 is considered a high severity vulnerability due to its potential for enabling unauthorized access to devices.
To fix CVE-2013-0980, update your iOS device to version 6.1.3 or later.
CVE-2013-0980 affects Apple iOS versions prior to 6.1.3.
CVE-2013-0980 exploits a flaw in the Passcode Lock implementation, specifically through the emergency-call feature.
Users of iOS versions before 6.1.3 are at risk from CVE-2013-0980, as it allows physically proximate attackers to bypass passcode protections.