Mac OSX High Sierra 10.13 and Greater Vulnerability

A security flaw has been detected in Mac operating systems, High Sierra 10.13 or greater.  This vulnerability allows anyone to login to a Mac device and change administrative settings by typing in the username “root” with no password more details can be found in the links provided.

Systems at Risk

  • Currently, this vulnerability is only detected in users with a Mac operating system that has been upgraded to High Sierra 10.13 or greater.
  • Impact:

o   Systems running Apple Remote Desktop (ARD) can be logged into remotely with a root account, no password.

o   Systems running Apple Screen Sharing can be logged into remotely with a root account, no password.

o   Systems with local console access, such as shared usage computers in teaching or lab environments, can be logged into locally with a root account, no password.

o   There are likely other services impacted on vulnerable systems

o   Vulnerable systems running SSH as a service are not affected by this issue, due to other controls in macOS

Systems Not at Risk

  • Mac operating systems that are prior to 10.13

Recommended Actions

More Information

https://www.macrumors.com/how-to/temporarily-fix-macos-high-sierra-root-bug/

https://www.theverge.com/2017/11/28/16711782/apple-macos-high-sierra-critical-password-security-flaw

http://www.pocket-lint.com/news/142980-macos-high-sierra-root-bug-allows-admin-access-without-a-password-who-is-affected-and-is-there-a-fix http://uk.businessinsider.com/macos-high-sierra-can-be-hacked-with-username-root-and-no-password-2017-11