Software bugs and security flaws are constantly found. Waiting at least a couple months isn't going to change that.
Best course of action is to make sure your system is up to date.
If this guy has access to the various betas, this is a real chump move. The defect would have been present in at least the last beta, if not before.
It's not free just because Apple stopped charging a separate fee for software. Every time someone buys a Mac, they are still paying for hardware + software.
The privilege escalation vulnerability in last year's High Sierra release was a huge embarrassment and could have been found with some simple testing. But it's also unreasonable to expect an OS to be completely bug-free.
You paid for the software updates when you purchased the hardware.
This reminds me of that time that Apple released a version of iMacOSx that allowed people to gain root by just pressing enter with no password... I love Apple's new beta-testing program... where they release beta software as if it's release-ready, to find the bugs they used to find and crush BEFORE releasing their new OS to the general user populace.
Researcher Patrick Wardle, who has uncovered many security flaws in Apple's macOS operating system, today shared some details on a new vulnerability that he's found in the newly released macOS Mojave update.
As outlined by BleepingComputer, Wardle discovered that he was able to access Contacts data from the address book using an unprivileged app, as demonstrated in the video below.
According to Wardle, the vulnerability is a result of the way that Apple implemented new macOS privacy protections in the Mojave update.The bypass does not work with all of the new privacy protection features in macOS Mojave, and hardware-based components, such as the webcam, are not affected. Full details on the vulnerability are not available yet, as Wardle plans to share technical details in November.
In the macOS Mojave update, Apple made a change that requires explicit user consent for apps to access location data, camera, contacts, calendars, reminders, messages history, Safari data, mail databases, and other sensitive data, which should prevent the vulnerability that Wardle demonstrates.
![]()
Apple will undoubtedly address the security flaw discovered by Wardle in an upcoming update to macOS Mojave.
Article Link: Bypass Flaw in Newly Released macOS Mojave Update Lets Hackers Access Protected Files
That was a long time ago - the most recent upgrades they charged for were $39 and $29 before they went free, if I recall correctly.Still Free. Apple used to charge for these upgrades before @ $129, Macs have always been priced on the higher end, so you can't debate that they cost more now because you're paying for the software upgrades, with inflation they still cost about the same they did when Apple charged for upgrades. Case closed, it's free software, stop complaining.
Still Free. Apple used to charge for these upgrades before @ $129, Macs have always been priced on the higher end, so you can't debate that they cost more now because you're paying for the software upgrades, with inflation they still cost about the same they did when Apple charged for upgrades. Case closed, it's free software, stop complaining.
Hmmm, Apple's bug bounty program not found.
There is really none?
Aloha "Patrick"
If you really are who you say you are, (skeptical) then I have some words for you. You have shown that there is a vulnerability in a brand new feature of an operating system on release day. No doubt, you timed this information release with the consumer release. If you had posted this information a week ago, in the format that you did, I would not have posted such a scathing assessment of your motives. However instead you have diverted the publicity of the release of a brand new operating system to your address book security bypass exploit. Congratulations on your media storm, this serves nothing but yourself.
There are reasons why ethical security researchers post information to the public. Those reasons include:
Active exploitation (i.e. malware found in the wild)
Refusal from the vendor to fix a known vulnerability
Edit: Also to provide mitigation instructions, which you have not.
None of these cases are true, unless you can show us an email from Apple stating they do not consider what you did a vulnerability. There is no reason why you could not sit on your hands, or assist Apple in developing a fix (they pay double for this, in their insider program I will mention later) while Apple included their fix in 10.14.1 or 10.14.0.1. This has minimal risk of being actively exploited, especially since you obviously knew of this flaw during beta. The whole point of the beta program is for testers and professionals to find bugs and fix them before they go live. By posting in the format you did, all you have done is make the security industry look bad.
Apple does have a bug bounty program, they just offer it to researchers that have a track record with them. If you wanted to get paid for your vulnerabilities, either work with Apple to get on that list, or send your vulnerabilities to the Zero Day Initiative.
I ask you to question yourself if you really did this to help the public, or to draw attention to yourself. Thank you for reading my lengthy response.
And that's why you never install a new major macOS version until at least a couple of months have passed
What, because security researchers withhold vulnerabilities they discovered in beta until it’s released to the public?
Vulnerabilities like this are discovered every day. We, as ethical researchers, should follow the industry standard of reporting these vulnerabilities so that the customer gets the fix as fast as possible, and that information on the vulnerabilities does not leak out.I think it is perfect timing. The more attention these issues get the better for consumers. As long as he doesn't sell zero day on blackmarket but shares it with public i am good with it.
Seems like you are more concerned with reputation of the brand Apple than their customers security.
Vulnerabilities like this are discovered every day. We, as ethical researchers, should follow the industry standard of reporting these vulnerabilities so that the customer gets the fix as fast as possible, and that information on the vulnerabilities does not leak out.
It does not matter that it was Apple, it could have been Microsoft releasing the latest Windows 10 "creator update" or whatever they are flavoring their builds as. If you have knowledge of a vulnerability during beta, you report it during beta and they fix it during beta. It is that simple.
This guy took the time to discover the vulnerability, write an exploit for it that worked, then sat on his hands until release day to make a statement and get publicity. That is what I have an issue with. It was unethical, and unprofessional.
Yeah, I hate it when highly complex code isn't perfect. Good thing there's Windows. Oh wait......
windows is going pretty well.. have you ever checked cve stats for macos?
Wardle characterized the flaw as trivial and it doesn't concern me. I'm glad I updated on day one as I always do, this is the best MacOS I have used to date and have experienced zero issues.I'm glad I opted to not update and I'll stick with HS for a little while longer