Story image

Apple addresses serious root access vulnerability in latest MacOS High Sierra update

30 Nov 2017

Apple has been quick to address another major security flaw in its macOS High Sierra 10.13.1 operating system after keen-eyed users found that anyone could gain root access to the system with a few easy steps.

According to reports, any person can log into a Mac device that runs High Sierra by using ‘root’ as the username and pressing the enter key several times. The login then results in all superuser access rights to the OS, leaving users’ data wide open for access.

The vulnerability, CVE-2017-13872, was patched by Apple yesterday. The company confirms suspicions that the vulnerability does have real dangers.

“An attacker may be able to bypass administrator authentication without supplying the administrator’s password,” the company says in its Security Update 2017-001 report.

“A logic error existed in the validation of credentials. This was addressed with improved credential validation.”

According to Centrify director of product management Peter Havens, the vulnerability has significant risks for enterprises that use Macs.

He says that the bug can allow access through both the login screen and screen saver lock screens for Macs joined by Active Directory.

“This is much more significant than the originally reported issue because it allows an admin to elevate privileges by unlocking system preferences,” Havens explains.

“In addition, if a Mac user has ‘screen sharing’ enabled - perhaps from a previous IT support issue - the root login can be used to remotely view the user’s screen without them knowing, or login remotely. While there is a simple workaround - by creating a user with the name ‘root’ and setting a unique and complex password - and Apple is sure to address this gaping hole quickly, it highlights a fundamental but ignored gap in enterprise security.”

He also notes that some companies use the same local admin password for every endpoint and believes that all local admin accounts including root accounts should have unique passwords that are randomly generated and rotated frequently.

“If you require the root user account on your Mac, you will need to re-enable the root user and change the root user's password after this update,” Apple warns.

It is not the first security flaw in High Sierra and its predecessor El Capitan – in September a Synack security researcher discovered that Mac Keychain can store online account usernames and passwords in plain text. 

In October Duo researchers also called out Apple’s pre-boot EFI firmware. They found that, out of almost all Apple Mac devices, Apple was not consistent with its firmware updates. While the operating systems were updated, firmware updates were often left behind.

“There was a surprisingly high level of discrepancy between the EFI versions we expected to find running on the real-world Mac systems and the EFI versions we actually found running,” researchers state. 

Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.