Skip to main content

Researcher claims to bypass iPhone security limits, but may have spoken too soon

iphone x notch
Julian Chokkattu/Digital Trends

For a brief moment, it seemed as though a security researcher had found a way to get past the security limits on iPhones and iPads by entering an infinite number of passcodes in order to hack into a device. The purported vulnerability was apparently even present in the latest version of iOS, 11.3, but Apple has now pushed back on these claims, and the researcher also appears to be backtracking on his initial findings.

When attempting to access a locked iPhone or iPad, users generally have a set number of passcode attempts to make before being locked out. You can even set your Apple device to automatically erase its contents if a hacker continuously attempts to guess your passcode. But according to Hacker House cybersecurity firm co-founder Matthew Hickey, if an iDevice is plugged in and a hacker tries to send keyboard inputs, it sets off an interrupt request that supersedes all other commands on the device. This, Hickey said, would allows hackers to send every single possible passcode combination in a single string, and because it wouldn’t give Apple’s software any respite, the inputs would take priority over any data-erasing security feature.

“Instead of sending passcode one at a time and waiting, send them all in one go,” Hickey explained. “If you send your brute-force attack in one long string of inputs, it’ll process all of them and bypass the erase data feature.”

However, Apple’s spokesperson countered these claims, noting simply, “The recent report about a passcode bypass on iPhone was in error, and a result of incorrect testing.”

And a bit later, Hickey seemed to concede that his method may not have been entirely accurate. In a tweet, the security researcher explained that not all of the tested passcodes are ultimately sent to an iPhone or iPad’s secure enclave, which is responsible for guarding against these sorts of attacks.

“The [passcodes] don’t always go to the [secure enclave processor] in some instances — due to pocket dialing [or] overly fast inputs — so although it ‘looks’ like pins are being tested, they aren’t always sent and so they don’t count, the devices register less counts than visible,” he noted.

Hickey said that when he attempted to verify his methods, he found where he may have gone wrong: “I went back to double check all code and testing. When I sent codes to the phone, it appears that 20 or more are entered but in reality it’s only ever sending four or five pins to be checked.”

In any case, Apple will soon be debuting another security feature called USB Restricted Mode, which should make it much more difficult for folks to access an iPhone or iPad.

Editors' Recommendations

Lulu Chang
Former Digital Trends Contributor
Fascinated by the effects of technology on human interaction, Lulu believes that if her parents can use your new app…
Something important just happened to the iPhone 16 series
iPhone 16 Pro and iPhone 16 Pro Max larger displays.

iPhone 16 Pro and iPhone 16 Pro Max renders MacRumors

With  the calendar about to turn to June, attention on the upcoming iPhone 16 series will soon shift into an even higher gear. Along those lines, word is that production on a critical component for at least three of these phones is about to begin.

Read more
Can a $500 Pixel phone beat a $1,000 iPhone in a camera test? I found out
iPhone 15 Pro (left) and Google Pixel 8a camera modules.

Right before Google I/O 2024, Google showed off the latest Pixel device, the Google Pixel 8a. This is the latest offering from the Pixel A-series, which is a more budget-friendly Pixel for those who don’t need all the bells and whistles of the flagship Pixel 8 or 8 Pro.

The Pixel 8a features a new design with more rounded corners and a matte-finish back. It packs Google’s latest silicon, the Tensor G3, but the camera hardware remains unchanged from its predecessor, the Pixel 7a.

Read more
Arc Search, one of the best iPhone apps right now, just got even better
Arc Search's Call Arc feature.

One of our favorite iPhone browser apps has just introduced an interesting new feature. Arc Search’s new "Call Arc" tool functions similarly to making a phone call on your iPhone 15 Pro or other iPhone. Instead of speaking to someone on the other end of the line, though, you ask Arc to answer your queries. The outcome is fresh and unique, and it actually works really well.

Before its latest software update, Arc Search already offered a voice search feature. The AI-powered Call Arc is different and designed for people on the go who are looking for quick answers to short questions.

Read more