Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Was offline experimenting when you replied - and having tested options I can confirm setting a password then subsequently disabling root user seems to work in 10.13.2.b5

UPDATE

yesterday I set a root password which seemed to prevent the blank password access then I disabled root user access and it seemed to block the root login. However today I found that it's back to the way it was with root user access without a password allowed again. It took me three tries the first time I tried today with root & blank. Subsequently this didn't work then later it worked after the second attempt. Not filling me with confidence and no security patch or update yet for 10.13.2 b5 17C83a
 
UPDATE

yesterday I set a root password which seemed to prevent the blank password access then I disabled root user access and it seemed to block the root login. However today I found that it's back to the way it was with root user access without a password allowed again. It took me three tries the first time I tried today with root & blank. Subsequently this didn't work then later it worked after the second attempt. Not filling me with confidence and no security patch or update yet for 10.13.2 b5 17C83a
You must leave root enabled with a password set to avoid this vulnerability. Disabling root opens it right back up to the vulnerable state, even after you've set a password.
 
Here's an interesting one. . . I installed the update the day it was released, and last night the update showed up again. Notice that it's in my installed list twice. I wonder if it has something to do with me installing the command line tools after the security update. No idea.

Screen Shot 2017-12-01 at 11.08.21 AM.png
 
Here's an interesting one. . . I installed the update the day it was released, and last night the update showed up again. Notice that it's in my installed list twice. I wonder if it has something to do with me installing the command line tools after the security update. No idea.

View attachment 739602

Happened to me as well, and perhaps everyone who installed quickly
I think the 2nd time included the fix for file sharing, but pointed to the same update
 
Here's an interesting one. . . I installed the update the day it was released, and last night the update showed up again. Notice that it's in my installed list twice. I wonder if it has something to do with me installing the command line tools after the security update. No idea.

View attachment 739602

The first one is build 17B1002 which had the file sharing bug.

The second one is build 17B1003 which fixed the file sharing bug.
 
You must leave root enabled with a password set to avoid this vulnerability. Disabling root opens it right back up to the vulnerable state, even after you've set a password.

Thanks for this advice

Beta 6 now available for download - let's see if this addresses the root user problem for Beta users.

Update

10.13.2 b6 public installed & trying to login as root user & blank password seems to be blocked.
 
Last edited:
Haha. The problem is that UAC has a whitelist hole that has existed since Windows 7 in the form of rundll32: https://arstechnica.com/information-technology/2009/02/the-curious-tale-of-windows-7s-uac/

The unfortunate reality is that Windows 10 still contains that hole. And the explanation given by Microsoft is that "Elevation is not a security boundary", and that it is meant to keep developers honest, not keep out malware. Which is weird, because on every other platform, elevation is a security boundary.

For your sake, I hope you have UAC set to always notify rather than the default.

Actually it doesn't. But is still a far cry from this recent exploit from Apple. Not even remotely the same. Dont pretend like they are. Windows 10 never had a exploit like the "root" exploit from Apple. Never.

“This is not a vulnerability but a method of bypassing a defense-in-depth feature – and it requires administrative privileges to work."

https://threatpost.com/latest-windows-uac-bypass-permits-code-execution/119887/

Why defend Apple on this? This is mind boggelling to me.

How about the recent iOS 11.2? Another diaster. How many bug fixes since iOS 11 released? With Apple pay cash on 11.2 some people have it and some don't. Huh? Really? A multi-billion dollar company.

Or the Dec 2nd bug? All three of these are all in the same month mind you.
All embarressing.

Microsoft got their act together on software and hardware. Apple doesn't, end of story. Microsoft is the new Apple and Apple is the old Microsoft. Sorry to burst your bubble buts its true.
 
Last edited:
What an ignorant statement. As a registered developer, believe me, I'd like nothing more than to be running the non-beta version. The only reason I'm running the beta right now is out of necessity, to provide sysdiagnose dumps to Apple in the hopes that they'll fix an incredibly annoying bug introduced by High Sierra that's causing a 70% hit to discrete GPU compute performance any time a 2016/2017 MacBook Pro has entered sleep long enough to enter standby (which is resulting in me having to restart High Sierra several times a day if I want to get any work done):

https://forums.macrumors.com/thread...ot-work-after-resume-from-long-sleep.2076334/

You wouldn't believe the hours I've wasted running "sudo sysdiagnose", installing logging profiles and uploading GBs of files to bugreport.apple.com since September. High Sierra is a hot mess. The least Apple could do, if they introduce a shoddy OS release that happens to also contain serious security flaws like this, is push out an update to the users who are helping them find and fix the bugs (whether they want to be or not).

It's not an ignorant statement, it's just a fact spelled out by Apple in the EULA. But I would rather make ignorant statement than an ignorant action, like installing an OS that has been out for less than a year (like High Sierra). Unless you bought a new laptop that shipped with High Sierra, there's no reason to have it installed right now. You won't find it on any of my 5 Macs.
 
Actually it doesn't. But is still a far cry from this recent exploit from Apple. Not even remotely the same. Dont pretend like they are. Windows 10 never had a exploit like the "root" exploit from Apple. Never.

“This is not a vulnerability but a method of bypassing a defense-in-depth feature – and it requires administrative privileges to work."

https://threatpost.com/latest-windows-uac-bypass-permits-code-execution/119887/

Why defend Apple on this? This is mind boggelling to me.

I'm not defending Apple on this bug, earlier in the thread, I call this a giant WTF on their part. It's also one of the worst Apple bugs in recent memory, as it can be automated more easily than most of the elevation bugs, which tended to be physical access elevation holes.

But the issue at play here is that you made a claim that Windows 10 is better here. It really isn't. The biggest issue that Windows has is that it is still relying on a security model that dates back to Windows XP. One where the default account is already root, and UAC was originally a full barrier between admin accounts and "root", but then gutted in Win 7 to not be that anymore. The statement above is basically an admission that on Windows, an admin account is effectively root, full stop. And unfortunately, they aren't taking steps to funnel users into safer configurations during setup of new machines or OS installs.

Meanwhile, Apple has been bolstering their security architecture. Root hasn't had permissions to write to much of the built-in parts of the OS since 10.11. Sandboxing is available to more developers than on Windows as a means to make it harder to turn a 3rd party exploit into an OS or user data exploit. Apple's architecture for securing biometric data is designed by a paranoid person. TPMs could learn a thing or two from the design.

Honestly, in a world where bugs are inevitable results of fallible human engineering, the security architecture is important as well. And it's something that Microsoft hasn't quite really taken to heart yet. Process-wise, Apple has always been behind the curve. It's been a long-standing complaint for years. Microsoft has endured the trial by fire on the importance of staying on top of security audits and patches. And yes, they've learned a lot.

Apple, on the other hand, hasn't really seemed to have learned the importance of security audits over the years. They have gotten slapped with more high profile bugs as a result, despite both platforms having the usual run of exploits found over the last couple years. But, the one thing Apple has been learning, is how to harden the architecture of their hardware and software. Something that Microsoft has been unwilling or unable to really attack on the same level.

How about the recent iOS 11.2? Another diaster. How many bug fixes since iOS 11 released? With Apple pay cash on 11.2 some people have it and some don't. Huh? Really? A multi-billion dollar company.

Nope, Apple's QA could use work, no doubt. Microsoft's isn't a golden goose in that regard either. With Windows 10, they've changed their cadence of patches, but speaking from experience, that doesn't mean the bugs don't exist.

That said, I do find it a bit funny that you throw in an issue with flighting a feature as a massive QA failure. Although I have seen a few high profile flighting gaffes in my time.

I'm also pretty jaded at this point. Only the younger naive version of me would expect bug-free software. I honestly laugh at the assertion that between Apple and Windows, the security one option provides is superior than the other. They both made certain investments, and they are taking their chances.

For now, the egg is on Apple's face. I'll just wait for the next high-profile gaffe on Microsoft's part.
 
Anyone downplaying this are the ones apple can do no wrong to them. They were the ones "holding it wrong" and said......"you're right"

I think this is an awful bug.

On the other hand, I thought the "holding it wrong" response was perfectly correct. You had to really try to touch all the points on an iPhone that would disable the antennae. It was like plugging your nose and trying to breathe through it. Let go of your nose and you'll be fine. :)
 
Wow....that is surprising. Most user will never login as root on their MAC.
But why would it have ever been set to blank?
That is how Linux series system do for root user: disable by default but does not have a password. Wait, Windows does the same for administrator account? Ok nvm.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.