Easily bypass the iPhone's authenticity thanks to the vulnerability on iOS 11
This is certainly not the good news Apple expects to receive after the iPhone's launch days. A bug on iOS 11 allows anyone to pass iCloud authentication with the wrong password during initial screen setup.
Although it sounds a bit strange, it is indeed possible to quickly remove authentication keys on iOS 11 devices. Videos posted by YouTube EverythingApplePro show that this technique can be used both on iPhone 7 and iPhone 8.
Basically, to bypass iCloud authentication, simply open the lock screen, then enter the code (wrong code) until the device is reactivated.
Error validated on iOS 11
It may take hours to complete the authentication session to expire. You will then return to the password entry screen, continue typing until the iPhone is reactivated. Then there will be no more iCloud accounts, which means you reopen the device without an account.
This error is available on iOS 11.1, Apple's latest OS and also used on iPhone X, so it is hoped that it will be fixed as quickly as possible. It is not known if this error is in the Beta.
See more: Latest iOS 11 has been hacked !!!
This is not the first time such vulnerabilities appear on iPhone. Most of the time, Apple will fix it, but they will be in no hurry. Apple already knows about this bug so hopefully will be fixed soon, especially when iPhone X has reached many users and started setting up authentication for the phone.
You should read it
- How to Remove iCloud Activation Lock on iPhone or iPad
- How to disable Activation Lock on iPhone
- 7 simple ways to fix Activation on iPhone phones
- How to lock the iPhone when lost fastest
- How to fix iPhone OS 9 lock version on network operators
- How to lock iPhone 6 does not require updating
- How to cancel the iPhone lock when entering the wrong password
- Apple device users are attacked by hackers remotely locking computers
May be interested
- Google Chrome has a serious zero-day error, and hackers can execute malicious code at its fullestthis vulnerability allows hackers to bypass the content security policy (csp) rules that were released in chrome 73. luckily, google has a patch for this vulnerability now.
- Microsoft urgently patched zero-day vulnerability after 2 years of refusing to acknowledge itmicrosoft has just released security updates to fix a high-severity zero-day vulnerability in windows.
- 12-year vulnerability in pkexec gives hackers root privileges on Linuxresearchers have just issued a warning about a vulnerability in polkit's pkexec component that is assigned the code cve-2021-4034 (and is known as pwnkit).
- Detected a serious zero-day vulnerability in Microsoft Office, click the document file and it will stickthe newly discovered vulnerability is called follina and currently there is no official patch from microsoft.
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windowsalthough microsoft releases patches for windows vulnerabilities on a monthly basis, there are still security issues that remain. recently, the us cybersecurity and infrastructure agency (cisa) reported a critical vulnerability in the windows print spooler system.
- Exchanging fake iPhones for real iPhones for 10 consecutive years caused Apple to lose 12 million USDfive chinese citizens living in the los angeles area exchanged fake iphones for real iphones 16,000 times over the course of 10 years, causing more than $12 million in damage to apple.
- What is VENOM Vulnerability? How can you protect yourself?the venom vulnerability affects all major cpu vendors, including intel, amd, and arm. venom allows malicious actors to read the contents of a computer's memory and potentially execute code remotely.
- Log4Shell zero-day vulnerability discovered, the new nightmare of enterpriseshow to exploit a critical zero-day vulnerability in the java-based apache log4j logging library has just been posted on the internet. this leaves users and businesses as well as organizations vulnerable to remote code execution attacks.
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to nowsecurity researchers have found a vulnerability in the microsoft windows platform binary table (wpbt). this vulnerability can be exploited by hackers to install rootkits on all windows computers shipped from 2012 to the present.
- Warning of dangerous Spring4Shell vulnerability, there are signs of scanning and exploitingspring has just released an urgent update to patch the spring4shell remote code execution zero-day vulnerability. information about this vulnerability was leaked on the internet before the patch was released.