Just a day after Apple released its iOS 6.1.3 update to address a lock screen bug that was found last month, another vulnerability has been discovered. This new bug is contained in the newest version of iOS, and so far it's been confirmed to work on both the iPhone 4 and iPhone 4S. As with other recent lock screen bugs, this new one requires that a few specific steps be performed, including the removal of the device's SIM card.
YouTube user videosdebarraquito discovered the vulnerability and has posted a clip showing it in action. In order to utilize the exploit, a user must initiate a voice call using the Voice Control feature from the iPhone's lock screen and then physically eject the SIM card tray from the device as the call is starting. Doing so will kick the user out to the Phone app's dialer, at which point the person will have access to the phone's Contacts, Favorites and other sections. The user can also view the photos stored on the phone by creating a new contact and selecting "Add Photo."
While this new iOS lock screen bug doesn't seem to require the fast fingers that past exploits have needed, it isn't quite as simple as just tapping a couple of buttons since the user must physically eject the SIM tray. The good news is that, since the bug appears to work thanks to the phone's Voice Dial functionality, disabling that feature in the Passcode Lock portion of an iPhone's settings could help to protect against the vulnerability. Apple has yet to comment on this latest bug, but just like Samsung, it appears that the company has yet another lock screen hole to patch. Stay tuned and we'll update you if Apple issues a statement on the matter.