ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Apple iOS 6.1.2 released for iPhone, iPad and iPod Touch: Summary of the change and bug fix of iOS 6.1.2

Updated on February 21, 2013

iOS 6.1.2 release changelog

The change and bug fix made in iOS 6.1.2 is summarized herein. iOS 6.1.2 in contrast to iOS 6.1.1 applies to all iOS 6 capable devices such as the iPhone 5, iPhone 4S, iPhone 4, iPhone 3GS, iPad 4 through iPad 2 and iPod Touch 5 and 4.
The change and bug fix made in iOS 6.1.2 is summarized herein. iOS 6.1.2 in contrast to iOS 6.1.1 applies to all iOS 6 capable devices such as the iPhone 5, iPhone 4S, iPhone 4, iPhone 3GS, iPad 4 through iPad 2 and iPod Touch 5 and 4.

iOS 6.1.2 release

On February 19, 2013, Apple issued the release of iOS 6.1.2 for their iDevices. This release arrived less than two weeks after the release of iOS 6.1.1 on February 6, 2013. However, while iOS 6.1.1 was released only for the iPhone 4S to fix a critical bug introduced in iOS 6.1, this latest update by Apple applies for all devices that supports iOS 6, i.e., the iPhone 5, iPhone 4S, iPhone 4, iPhone 3GS, iPad 4, iPad 3, iPad 2 and the iPod Touch of fifth and fourth generations. This article will highlight and summarize the bug fix made in the iOS 6.1.2 release and also discuss how it affects the users in terms of functionality and jailbreak potential.

The purpose of the present iOS 6.1.2 release is to address a bug for users using the calendar function in Microsoft Exchange that was introduced with the release of iOS 6.1. The official changelog from Apple states the following:

"Fixes an Exchange calendar bug that could result in increased network activity and reduced battery life."

This Microsoft Exchange bug caused devices which communicated with a Microsoft Exchange server to sometimes get stuck in an endless loop which significantly increased the network activity (data traffic) and therefore also severely deteriorated the battery life. In fact, the bug is so severe that some companies and corporations, such as AOL, even restricted or throttled the use of Microsoft Exchange for iPhone, iPad and iPod Touch users due to the heavy load on the servers that the bug introduced.

The bug fix for Microsoft Exchange Calendar is apparently the only change made in the iOS 6.1.2 release. As it turns out, this is both good and bad news. The good news is that an untethered jailbreak for iOS 6.1.2 exists through the evasi0n tool, while the bad news is that the passcode security exploit still remains. These two aspects will be further discussed below.

Status of the critical passcode exploit in iOS 6.1.2

The release of iOS 6.1 was not completely trouble free. So far, two critical issues have been found. The first issue was a bug affecting only iPhone 4S users which resulted in very poor connectivity and subsequently battery life. This issue was fixed with iOS 6.1.1 as described here.

While the first issue is more function related, the second issue is perhaps even more critical as it is classified as a security exploit. This exploits allows anyone to bypass the iPhone passcode lock and in this way gain direct access to the Phone app which means that unauthorized users can edit the contact list and also place any calls they wish without knowing the passcode. The description of the exploit itself is beyond the scope of this article, but briefly, it is based on fiddling around with the emergency call function on an iPhone which eventually opens up the Phone app itself.

When iOS 6.1.2 was first released, rumors circulated that it in addition to fixing the Exchange Calendar bug also fixed the passcode exploit. However, this unfortunately turned out to not be the case, and the passcode exploit has been verified to still exist in iOS 6.1.2. Therefore, it is also for this reason expected that Apple will release iOS 6.1.3 in the near future.

Untethered jailbreak status in iOS 6.1.2 using the evasi0n tool

With every single new iOS release, the jailbreak community is always nervous that Apple may patch up exploits that allow a device to be jailbroken. This was the case for the release of iOS 6.1.2 as well. Fortunately, it turned out that iOS 6.1.2 did not carry any patches for the jailbreak exploits and the evasi0n untethered jailbreak tool was quickly updated to support this version as well. This means that users on jailbroken devices can safely upgrade to iOS 6.1.2 and subsequently use the evasi0n untethered jailbreak tool to jailbreak their devices again. A guide of the jailbreaking process can be found here.

Even if you do not use Microsoft Exchange, it is still recommended to upgrade to iOS 6.1.2. The reason is that experience has shown that having the highest jailbreak capable iOS version means that your device will support all jailbreak tweaks instead of being iOS version limited. In addition, as the passcode exploit is still not fixed, it is expected that Apple will be quick to release the iOS 6.1.3 version which very well may render the current jailbreak methods useless.

Words of caution for users who upgrade to iOS 6.1.2: If you are on a jailbroken device or plan to jailbreak your device after an upgrade to iOS 6.1.2, do not use the over-the-air (OTA) upgrade function found in the Settings app on your iPhone, iPad or iPod Touch. Instead, connect your device to your computer and do a full upgrade using iTunes, making sure that you do a full backup either to iCloud or to your computer first. OTA upgrades are known to cause all kinds of problems for jailbreakers and the evasi0n tool does not support devices upgraded through the OTA function.

Related iOS 6 articles for iPhone, iPad and iPod Touch

  • Untethered jailbreak guide for iOS 6.0.x, 6.1, 6.1.1 and 6.1.2: The untethered jailbreak process is thoroughly described in this article using the evasi0n untethered jailbreak tool.
  • General iOS jailbreak guide for newbies: The basic terminology and methods are introduced in this general jailbreak guide aiming to provide the interested users with the required background information to understand the jailbreaking process.

  • iOS 6.1 release highlights: iOS 6.1 brought some significant changes and added additional features for its users, in particular enhanced 4G and LTE support for iPhones and iPads. This and other important changes are discussed in this article.

  • iOS 6.1.1 release summary: iOS 6.1 introduced a critical bug affecting only iPhone 4S users. This article summarizes the iOS 6.1.1 release and discusses why the bug fix is important for affected users.

iOS 6.1.2 conclusions and summary

iOS 6.1.2 is once again a relatively small update carrying only one change to the system. However, for users who are dependent on Microsoft Exchange, the release is surely critical and of high importance. It is just unfortunate that Apple did not manage to fix the passcode exploit in it as well. For now, all we can do is to hope that Apple will fix the passcode exploit in iOS 6.1.3 and hopefully not patch up the jailbreak exploits used by the evasi0n untethered jailbreak tool.

iOS 6.1.2 bug fix poll

Did you upgrade to iOS 6.1.2 to fix the Microsoft Exchange bug?

See results

iOS 6.1.2 rating

4 stars for quality and timeliness of the iOS 6.1.2 release


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)