According to a new story on Ars Technica, no sooner has iOS 6.1.3 been released, largely to correct a lock-screen vulnerability, a new such vulnerability has been found. The bug was found by a YouTuber, videosdebarraquito, who detailed his findings in the video that heads this post. Basically, what he has discovered is that in order to bypass the password lock, and potentially gain access to a personís private data on their iPhone, a person with malicious intent can simply eject the iPhone SIM card when using the voice control to make a call. The phone used in the video is an iPhone 4, which of course does not have Siri, but as Ars Technica explains, the bug does not actually work with Siri: it in fact uses the older Voice Control feature that was available prior to Siri. Various websites have tested the bug to see what phones are vulnerable, and it appears that The Next Web was able to get it to work on an iPhone 4S, but not an iPhone 5, although Ars Technica says that German website iPhoneblog.de did manage to get it to work on an iPhone 5. Doubtless Apple is busy reading a new fix for this bug too!
Source: One day after iOS 6.1.3, a new iPhone lock screen bug emerges | Ars Technica