sb-as logo
Story image

Apple addresses serious root access vulnerability in latest MacOS High Sierra update

30 Nov 2017

Apple has been quick to address another major security flaw in its macOS High Sierra 10.13.1 operating system after keen-eyed users found that anyone could gain root access to the system with a few easy steps.

According to reports, any person can log into a Mac device that runs High Sierra by using ‘root’ as the username and pressing the enter key several times. The login then results in all superuser access rights to the OS, leaving users’ data wide open for access.

The vulnerability, CVE-2017-13872, was patched by Apple yesterday. The company confirms suspicions that the vulnerability does have real dangers.

“An attacker may be able to bypass administrator authentication without supplying the administrator’s password,” the company says in its Security Update 2017-001 report.

“A logic error existed in the validation of credentials. This was addressed with improved credential validation.”

According to Centrify director of product management Peter Havens, the vulnerability has significant risks for enterprises that use Macs.

He says that the bug can allow access through both the login screen and screen saver lock screens for Macs joined by Active Directory.

“This is much more significant than the originally reported issue because it allows an admin to elevate privileges by unlocking system preferences,” Havens explains.

“In addition, if a Mac user has ‘screen sharing’ enabled - perhaps from a previous IT support issue - the root login can be used to remotely view the user’s screen without them knowing, or login remotely. While there is a simple workaround - by creating a user with the name ‘root’ and setting a unique and complex password - and Apple is sure to address this gaping hole quickly, it highlights a fundamental but ignored gap in enterprise security.”

He also notes that some companies use the same local admin password for every endpoint and believes that all local admin accounts including root accounts should have unique passwords that are randomly generated and rotated frequently.

“If you require the root user account on your Mac, you will need to re-enable the root user and change the root user's password after this update,” Apple warns.

It is not the first security flaw in High Sierra and its predecessor El Capitan – in September a Synack security researcher discovered that Mac Keychain can store online account usernames and passwords in plain text. 

In October Duo researchers also called out Apple’s pre-boot EFI firmware. They found that, out of almost all Apple Mac devices, Apple was not consistent with its firmware updates. While the operating systems were updated, firmware updates were often left behind.

“There was a surprisingly high level of discrepancy between the EFI versions we expected to find running on the real-world Mac systems and the EFI versions we actually found running,” researchers state. 

Story image
Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy
Okta, CrowdStrike, Netskope and Proofpoint have joined forces to develop and launch an integrated, zero trust security strategy, stating that this is crucial for today’s digital and remote working environments.More
Link image
Enterprises ditching passwords & joining crypto revolution
Now, businesses relying on hardware tokens, software tokens, and passwords can secure high-risk operations and authenticate transaction approvals without the typical security, usability, and cost trade-off of those methods.More
Story image
The 5 most common multi-factor authentication (MFA) methods
While MFA is ubiquitous, it’s far from perfect – whether you’re the business or the end-user. Here are the 5 most common MFA methods, and where each of them falls short. More
Story image
Businesses move to cloud-based security solutions in a bid to support remote working
Cloud-based security tools are becoming increasingly popular following the rise in remote working during COVID-19, including a marked increase in businesses using such tools to protect of corporate financial information.More
Story image
Cybercrims' web skimming strategies taint web analytics platforms
“This is a technique we have not seen before, and one that is particularly effective."More
Story image
54% rise in gaming-related cyber attacks recorded in April
Social isolation measures, widely implemented throughout the world during March and April, has been linked to both the increase in engagement for gaming and a corresponding boom in game-related cyber attacks.More