{"id":54494,"date":"2018-10-13T02:10:36","date_gmt":"2018-10-13T02:10:36","guid":{"rendered":"https:\/\/appleinsider.com\/articles\/18\/10\/12\/voiceover-bug-lets-hackers-view-iphone-photos-send-them-to-another-device"},"modified":"2018-10-13T02:10:36","modified_gmt":"2018-10-13T02:10:36","slug":"voiceover-bug-lets-hackers-view-iphone-photos-send-them-to-another-device","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2018\/10\/13\/voiceover-bug-lets-hackers-view-iphone-photos-send-them-to-another-device\/","title":{"rendered":"VoiceOver bug lets hackers view iPhone photos, send them to another device"},"content":{"rendered":"<p><!-- font size selector, BEGIN --> <span class=\"cfix\">\u00a0<\/span> <\/p>\n<p class=\"gray small byline\"> By <a href=\"mailto:mikeycampbell@gmail.com\">Mikey Campbell<\/a> <br \/><span class=\"gray\">Friday, October 12, 2018, 07:10 pm PT (10:10 pm ET)<\/span> <\/p>\n<p> <span><span class=\"article-leader\">Amateur iOS hacker Jose Rodriguez on Friday unearthed another obscure, yet effective, lock screen bypass that leans on an unpatched bug in VoiceOver to gain unauthorized access to photos on a target device. <br \/><\/span><\/p>\n<div align=\"center\">\n<div class=\"article-img\"><img decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2018\/10\/voiceover-bug-lets-hackers-view-iphone-photos-send-them-to-another-device.jpg\" alt=\"\" height=\"365\" class=\"lazy\" \/><img decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2018\/10\/voiceover-bug-lets-hackers-view-iphone-photos-send-them-to-another-device-1.jpg\" \/><\/div>\n<p><span class=\"minor2 small gray\"><\/span><\/div>\n<p>Detailed in a brief video posted to Rodriguez&#8217;s <a href=\"https:\/\/www.youtube.com\/watch?v=CjiLN2L_v5k&amp;feature=youtu.be\">YouTube channel<\/a>, the exploit requires a would-be hacker have both their personal device and a target iPhone handy at the time of attack.<\/p>\n<p>As Rodriguez explained to <em>AppleInsider<\/em>, the target iPhone first receives a phone call from an outside number, which triggers a standard iOS call dialogue. If the attacker does not know the target iPhone&#8217;s number, they can acquire caller ID information by invoking Siri and asking the assistant to call their personal phone digit-by-digit. <\/p>\n<p>In his proof-of-concept video, Rodriguez taps on the &#8220;Message&#8221; option on the iOS call screen and selects &#8220;Custom&#8221; to display the Messages user interface. After entering a few random letters in the text box, he once again invokes Siri to activate VoiceOver. <\/p>\n<p>Returning to Messages, Rodriguez taps on the camera icon and, while invoking Siri with iPhone&#8217;s side button, double taps the screen to trigger what appears to be a system-level conflict. While this particular step must be performed with a certain level of precision, an attacker can repeat the process multiple times until the desired effect is achieved. <\/p>\n<p>A black screen is displayed when the bug condition is met. As Rodriguez demonstrates, however, VoiceOver&#8217;s text selection tool is able to access &#8220;hidden&#8221; UI options through typical navigation gestures. Swiping left on the blank screen takes Rodriguez to &#8220;Photo Library&#8221; which, when selected by double tapping, returns him to the Messages app. <\/p>\n<p>The app drawer below the text input box is blank, but leaves the app card collapse button active. Tapping on said element \u2014 a small handlebar \u2014 and swiping right grants VoiceOver unseen access to a target device&#8217;s photos, details of which are read aloud by the system. <\/p>\n<p>Swiping through the photo library, which is seemingly obscured by the Messages UI, and double tapping on a given photo inserts the image into the Messages text box. Multiple photos can be inserted, viewed and sent to an attacker&#8217;s device in this manner. <\/p>\n<p><em>AppleInsider<\/em> independently confirmed Rodriguez&#8217;s findings using current model iPhones, including iPhone X and XS devices, running the latest iOS 12.0.1.<\/p>\n<p>[embedded content]<\/p>\n<p>Word of the bypass arrives two weeks after Rodriguez discovered a pair of similar <a href=\"https:\/\/appleinsider.com\/articles\/18\/09\/28\/complex-ios-passcode-bypasses-grant-access-to-iphone-contacts-and-photos\">VoiceOver vulnerabilities<\/a> that grant unauthorized access to user contacts and photos. Unlike the previously uncovered methods, today&#8217;s technique is far less involved and allows would-be attackers to offload photos onto another device with relative ease.<\/p>\n<p>Concerned users can minimize exposure to the apparent bugs by disabling Siri lock screen access in <strong>Settings &gt; Face ID &amp; Passcode or Settings &gt; Touch ID &amp; Passcode<\/strong> under the &#8220;Allow access when locked&#8221; heading. <\/p>\n<p><\/span> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 By Mikey Campbell Friday, October 12, 2018, 07:10 pm PT (10:10 pm ET) Amateur iOS hacker Jose Rodriguez on Friday unearthed another obscure, yet effective, lock screen bypass that leans on an unpatched bug in VoiceOver to gain unauthorized access to photos on a target device. Detailed in a brief video posted to Rodriguez&#8217;s [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":54495,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[353],"class_list":["post-54494","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple-insider","tag-iphone-ios"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/54494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=54494"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/54494\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/54495"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=54494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=54494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=54494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}