Top companies

ASIANPAINT - 2426.3 (2.37%) AXISBANK - 1175 (0.14%) BAJAJFINSV - 2009.1 (-2.18%) BAJFINANCE - 922.7 (-1.49%) BHARTIARTL - 2030 (0.52%) BPCL - 331.95 (0%) COALINDIA - 386.9 (-0.65%) HDFCBANK - 1985.5 (-1.32%) HEROMOTOCO - 4238 (0.21%) HINDUNILVR - 2306.9 (0.39%) ICICIBANK - 1427.8 (-0.29%) INDUSINDBK - 856.75 (-2.54%) ITC - 413.2 (-0.46%) KOTAKBANK - 2164.5 (-0.87%) MARUTI - 12615 (1.39%) ONGC - 241.1 (-0.93%) RELIANCE - 1517.1 (-0.74%) SBIN - 812.7 (-0.93%) TATAMOTORS - 687.8 (0.59%) TATASTEEL - 165.95 (3.68%) TCS - 3423.5 (-0.18%) TITAN - 3707 (0.18%) WIPRO - 267.15 (0.98%)
TRENDING #BANK NIFTY 149 #ADANIPORTS 86 #ZOMATO 72

Google Pixel bug allowed anyone to bypass lock screen password, grant access to users’ private data

15 Nov , 2022   By : Monika Singh


Google Pixel bug allowed anyone to bypass lock screen password, grant access to users’ private data

Pixel smartphone users, beware! A new vulnerability has been discovered by cybersecurity researcher David Schutz. This flaw will allow anyone to unlock the lock screen and open your Pixel device without your fingerprint or password.

Hungary-based David Schutz, in his recent blog post, has labelled the vulnerability with the number CVE-2022-20465 and said that he is not quite sure if it will affect other android smartphones as well. Although, he was able to find out this flaw only on a Pixel device. He noted that if anyone gave him a locked Pixel device, he would give it back unlocked.  





He further added that Google had rectified this issue on November 5, 2022, in a security update. According to him, he had reported this flaw in June which means it took five months for the company to fix this issue. 





He carried out this experiment on Google Pixel 6 and Pixel 5 smartphones. 



What went wrong? 

He found the vulnerability when one day his phone ran out of battery. After which, he connected his device’s charger and booted the phone. Upon doing this, he was asked to enter the security PIN for the SIM card which he didn’t really remember. So, he ended up putting in the wrong PIN three times. 

After this, the smartphone asked him to put in SIMS’s PUK code for the smartphone to unlock. For those unaware, the PUK code referred to as Personal Unlocking Key is used in resetting the PIN number of the phone. It is used to protect your mobile SIM card. PUK code is unique to your SIM card.  

Coming back, once he put in the PUK code he noticed something. The smartphone had started displaying the fingerprint icon which was not supposed to happen. 



What happened next? 

Schutz repeated the process without rebooting the phone. He then removed the SIM tray and re-inserted it back while the device was on. He once again typed the wrong PIN three times and then the PUK and after that set the new PIN.  

Surprisingly, the phone unlocked and took him to the home screen while the phone was still locked. To check this process, he repeated this process multiple times and each time got the same result. 

After this incident was reported in June, Google fixed the issue on November 5, 2022, which means it took five months for the company to fix this issue.


Google has rewarded this cybersecurity researcher $70,000 for privately reporting this flaw under its bug bounty program





0 Comment


LEAVE A COMMENT


Growmudra © 2025 all right reserved

Partner With Us