Apple plans to launch iOS 13 next week, but a security researcher has already discovered a bypass on the lock screen. The exploit allows you to skip the lock screen and get access to all contact information on an iPhone. José Rodríguez discovered the exploit and revealed to The Verge that he informed Apple on July 17, but it still works on the Gold Master (GM) version of iOS 13 that will be released on September 19.  Rodriguez discovered a screen lock exploit last year for iOS 12.1, and the latter bypass for iOS 13 uses a similar technique. It involves activating a FaceTime call and then accessing the voice over function of Siri to allow access to the contact list. You can then get email addresses, phone numbers, address information and more from the contact list.
The Verge has proven and confirmed that the bypass procedure works on iOS 13 GM running on an iPhone X. However, it cannot access the pictures. Naturally, this requires physical access to an iPhone and some time to start a FaceTime call and enable voiceover.
Rodriguez says the exploit appears to be fixed in iOS 13.1 beta copies, which Apple plans to make available on September 30. .
This is the last of a long line of skip screen skip errors for iOS. An error in iOS 6.1 in 2013 allowed attackers to access phone records, contact information and even photos. iOS 7 also included a similar security hole, it could ignore the iOS 8.1 lock screen, and iOS 12.1 also had problems.