I’m aware that was the reality; however, Macs were the minority and weren’t a high profile target for hackers. That’s changed.
Seems like the root user is being enabled pretty effortlessly with local access. I thought SIP was supposed to be a hard wall against the root user?
We need an "Even Higher Sierra" release, and only that, this coming year.
High Sierra is just stoned enough that she's letting everyone in...
Maybe if Sierra gets a bit higher, paranoia, and security concerns, might kick in.
Just another reason for me to not use macOS any longer
Ya luckily Windows and Linux have no exploits.
We need an "Even Higher Sierra" release, and only that, this coming year.
High Sierra is just stoned enough that she's letting everyone in...
Maybe if Sierra gets a bit higher, paranoia, and security concerns, might kick in.
I am Root.
How many people have their computer set up with guest accounts (especially with a non-trivial root password)?
Not saying this isn't bad, but isn't the default to not have guest accounts?
Not as big of a problem for the home but a massive issue for corporations like IBM or Google, both of which have thousands of Macs for their developers.
Has anyone tried setting a password on the root account?
1. Open terminal app
2. type: sudo su -
3. enter your password
4. You've not entered a REAL root shell (not sudo). be careful.
5. type: passwd
6. enter a new password for the root user
7. repeat it
8. type: exit
9. close the terminal app
After this, try getting elevated rights in settings again.
I'm not on High Sierra so I cannot test - I'd be interested to hear how it goes.
Has anyone tried setting a password on the root account?
1. Open terminal app
2. type: sudo su -
3. enter your password
4. You've not entered a REAL root shell (not sudo). be careful.
5. type: passwd
6. enter a new password for the root user
7. repeat it
8. type: exit
9. close the terminal app
After this, try getting elevated rights in settings again.
I'm not on High Sierra so I cannot test - I'd be interested to hear how it goes.
Solves the problem for the time being.
Guys correct me if I am wrong but isn't the root account on osx suppose to be disabled by default? Looks like someone left it enabled.
Wasn’t this the no features, bug fixing release?
Sounds like it’s just marketing spin. Apple didn”t invest in the Mac OS, that’s all.
Yes, that’s the recommended course of action for now.
Damn, if I'd posted this morning, I could be famous now. oh well.
Wow!!!! That is quite racist douche-bag’y of you. Bugs in programs are not because of the nationality of the programmer, they are cause the programmer is just a bad one OR some paper-pusher project management executive in Apple does not believe in test driven development and is ridiculous pushing deadlines down the throats of the programmers.
Local access to a corporate workstation isn't that big of an issue if everything is locked out with other logins. Plus those developers are probably working on open source projects so any data stored locally is probably not that important. Not a big deal. Apple shouldn't even prioritize fixing this.
Yes, that’s the recommended course of action for now.
[doublepost=1511928260][/doublepost]
By that token they never invested in any version of OS X, as they all had root escalation exploits, including the much touted Snow Leopard.
So it requires physical access to a Mac that's not just "unlocked" but that has the Users dialogue open with the padlock showing that the pane is unlocked as well. So, no risk if no one else has physical access to the machine or those that do don't know the password. Not exactly like anyone can log in with root, requiring no unlocking at all. So, a bug? Yes. A catastrophic and highly embarrassing failure? Not really.
1. This technically is not a root escalation exploit. This is a wide-open system with root being the same a guest login—no password required.
2. This is new in High Sierra, so trying to compare this unforgivable sloppiness to more sophisticated hacks is a false equivalent. Even Apple”s biggest apologists are hammering them tonight for this.
Read the article. The login screen can be fooled too. That means, anyone with physical access, have root access.
This level of "hack" requires the IQ of a potato to perform which means this is one of the worst security bugs to pop up in YEARS!
Saw some posts somewhere that said this was the worst lack of security in any OS ever. How about no password admin for windows forever. Boot into safe mode on pretty much anybody's machine and log in as admin and remove the users password and reboot and bam into their account. (People that knew better would give the admin a password but many did not.)