Bernd Marienfeldt and Jim Herbeck have discovered that a fully up-to-date, non-jailbroken iPhone 3GS can be plugged into a computer running Ubuntu Lucid Lynx that will allow nearly full read access to the iPhone's storage, even when it's locked by pin authentication.
Bernd states in his write up that:
“This data protection flaw exposes music, photos, videos, podcasts, voice recordings, Google safe browsing database, game contents… by in my opinion the quickest compromising read/write access discovered so far, without leaving any track record by the attacker. It’s about to imagine how many enterprises (e.g. Fortune 100) actually do rely on the expectation that their iPhone 3GS’s whole content is protected by encryption with a PIN code based authentication in place to unlock it.
The contents sample have been collected off a non jail broken iPhone 3GS (with latest iPhone OS installed, all apps fully up to date and immediately PIN lock enabled) by simply connecting it powered off via USB to a Linux Lucid Lynx PC (10.04) and then switched back on – being automatically mounted with given insecurity and never been attached to the PC before.
Other exposed contents and OS behavior has to be further investigated. The write access could also lead into triggering a buffer overflow.”
This will be a big issue for enterprises who think that the data held in the device is encrypted and secure. Check out Bernd’s full write up at his blog - HERE