![]() “The user account named ”root” is a superuser with read and write privileges to more areas of the system, including files in other macOS user accounts.” The problem is that once you have penetrated the Mac as a root “superuser” you are able to get inside System Preferences to make other changes, install software, and access files inside other user accounts. I urge you not to test it yourself, but I suggest you take immediate steps to patch the problem as detailed below. You can log in as root even after the machi was rebooted /fTHZ7nkcUp Multiple people tested this successfully. You’ll be denied entry initially, but after a few tries you will get in. Anyone with access to your Mac can launch it, enter the word root as the User ID and hit return, while leaving the password field blank. Are you aware of it Lemi Orhan Ergin November 28, 2017Īny Mac running macOS High Sierra is vulnerable to this problem. Anyone can login as "root" with empty password after clicking on login button several times. The problem (which first got disclosed here) was first revealed in a Tweet by Lemi Orhan Ergin, who wrote:ĭear we noticed a *HUGE* security issue at MacOS High Sierra. What’s the problem with macOS High Sierra? ![]() UPDATE (29 November 9:30am PDT) : Apple has issued an apology and a patch to rectify this problem, more details here. The flaw means anyone with physical access to your Mac can get inside the machine and tinker with it. Complacency and incompetence are the biggest computer security threats, and Apple’s latest Mac security flaw seems to combine both of these. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |