Story image

Apple addresses serious root access vulnerability in latest MacOS High Sierra update

30 Nov 2017

Apple has been quick to address another major security flaw in its macOS High Sierra 10.13.1 operating system after keen-eyed users found that anyone could gain root access to the system with a few easy steps.

According to reports, any person can log into a Mac device that runs High Sierra by using ‘root’ as the username and pressing the enter key several times. The login then results in all superuser access rights to the OS, leaving users’ data wide open for access.

The vulnerability, CVE-2017-13872, was patched by Apple yesterday. The company confirms suspicions that the vulnerability does have real dangers.

“An attacker may be able to bypass administrator authentication without supplying the administrator’s password,” the company says in its Security Update 2017-001 report.

“A logic error existed in the validation of credentials. This was addressed with improved credential validation.”

According to Centrify director of product management Peter Havens, the vulnerability has significant risks for enterprises that use Macs.

He says that the bug can allow access through both the login screen and screen saver lock screens for Macs joined by Active Directory.

“This is much more significant than the originally reported issue because it allows an admin to elevate privileges by unlocking system preferences,” Havens explains.

“In addition, if a Mac user has ‘screen sharing’ enabled - perhaps from a previous IT support issue - the root login can be used to remotely view the user’s screen without them knowing, or login remotely. While there is a simple workaround - by creating a user with the name ‘root’ and setting a unique and complex password - and Apple is sure to address this gaping hole quickly, it highlights a fundamental but ignored gap in enterprise security.”

He also notes that some companies use the same local admin password for every endpoint and believes that all local admin accounts including root accounts should have unique passwords that are randomly generated and rotated frequently.

“If you require the root user account on your Mac, you will need to re-enable the root user and change the root user's password after this update,” Apple warns.

It is not the first security flaw in High Sierra and its predecessor El Capitan – in September a Synack security researcher discovered that Mac Keychain can store online account usernames and passwords in plain text. 

In October Duo researchers also called out Apple’s pre-boot EFI firmware. They found that, out of almost all Apple Mac devices, Apple was not consistent with its firmware updates. While the operating systems were updated, firmware updates were often left behind.

“There was a surprisingly high level of discrepancy between the EFI versions we expected to find running on the real-world Mac systems and the EFI versions we actually found running,” researchers state. 

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.