Apple plans to release iOS 13 next week, but a security researcher has already discovered a bypass for bypass screens. The exploit allows you to bypass the lock screen and access all contact information on an iPhone. Jose Rodriguez discovered the exploit, revealing The Verge that he had reported it to Apple on July 17, but it still works in the Gold Master (GM) version of iOS 13, released on September 19th becomes.  Rodriguez discovered a lock-screen exploit for iOS 12.1 last year, and this latest bypass for iOS 13 uses a similar technique. This requires activating a FaceTime call and then accessing the voiceover feature from Siri to access the contact list. You can then retrieve e-mail addresses, phone numbers, address information, and more from the contact list.
The Verge has tested and confirmed that the bypass procedure works on iOS 1
According to Rodriguez, the exploit seems to be fixed in beta versions of iOS 13.1, which Apple plans to release on September 30.
This is the latest in a long line of bypass error bugs for iOS. A bug in iOS 6.1 in 2013 allowed attackers to access phone records, contact information, and even photos. iOS 7 also included a similar vulnerability, bypassing the iOS 8.1 lock screen, and iOS 12.1 also had issues.