Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
It's a matter of minutes that botnets are searching ssh open Mac's from the Interweb... and it will be like the loveletter on Windows long time ago... hundreds of thousands of computers will be infected.

Its pretty shocking actually
[doublepost=1511953431][/doublepost]
It absolutely works!!!

The first time I tried, username "root", then I clicked the password field and left if blank, but it did not work. The second time though I typed some text in the password field then backspaced so it remained blank, and viola! I was able to unlock it!

Serious oversight!!! Crazy. And equally highly interesting something so simple can be achieved like this. I wonder what the significance of "root" username with a blank field is.

It took me two clicks for it to works as well.
 
And that's one of the reasons why I always stay one OS behind all the time. Still on Sierra and will until next OS comes out.
 
Iv'e been using Macs for the past 30+ years. I suppose you could call me a 'Macoholic', an original 'Mac Fan Boy' (although not a boy anymore!!) There has been a few bumps along the way but I have generally supported their choice of direction including some of the more controversial decisions like 'removing the floppy drive in 1998'. Overall I think they had done a great job with software and hardware, leading the way and causing others for follow... Until now!! Apple have really dropped the ball. MacOS 10.13, iOS11 have been released far too early, they're simply not ready.
NOTE TO APPLE: Slow down, you don't have to release a new system every 12 months, release it when it's ready. You will get criticised for being slow, but that criticism will soon fade when you release something and "it just works". This is how it used to be back in the day when a Mac's simplicity and reliability made PC's look stupid.
 
  • Like
Reactions: heffsf and glazball
And that's one of the reasons why I always stay one OS behind all the time. Still on Sierra and will until next OS comes out.

Smart idea. I'm too much of a sucker for the new features in every release. But after this maybe I might do the same thing.
[doublepost=1511954808][/doublepost]
Iv'e been using Macs for the past 30+ years. I suppose you could call me a 'Macoholic', an original 'Mac Fan Boy' (although not a boy anymore!!) There has been a few bumps along the way but I have generally supported their choice of direction including some of the more controversial decisions like 'removing the floppy drive in 1998'. Overall I think they had done a great job with software and hardware, leading the way and causing others for follow... Until now!! Apple have really dropped the ball. MacOS 10.13, iOS11 have been released far too early, they're simply not ready.
NOTE TO APPLE: Slow down, you don't have to release a new system every 12 months, release it when it's ready. You will get criticised for being slow, but that criticism will soon fade when you release something and "it just works". This is how it used to be back in the day when a Mac's simplicity and reliability made PC's look stupid.

They seem to be killing the golden goose in a rush to make more gold.
 
It took me two clicks to reproduce it, at first I tapped on the password area and left it blank, the second time I didn't click on the area and it worked.
I had the problem only on my new MBP since I installed it from scratch and didn't set the root password, on the old one I updated to high sierra but the root password was already set so I can't get access with a blank one.
You wonder how they didn't catch such a big security flaw, their QA is disappointing.
 
  • Like
Reactions: Skeptical.me
The crazy thing is that even though the "root" user is not listed on the accounts settings, it now shows at the log in screen!!! This is nuts. How do I remove it!?

HC3tgKj.png
 
  • Like
Reactions: Skeptical.me
The QA department must still be transitioning to Apple Park. I'm sure once everyone is settled in, attention to detail can resume.
Actually, this should have been caught in a code review, which should definitely be done with every item that directly involves security (in fact, code reviews should be done on everything, but I doubt that Apple or anyone else really does that).

This isn't a testing or QA problem, it falls squarely on the shoulders of the coders and their management. Big fail on Apple's part. Maybe they should be spending more time on engineering and coding rather than worrying about reaching their one millionth patent.
 
No, this particular bug is unique to High Sierra. Root escalation exploits on the other hand have been available on every version, until found and patched.
Why is is this just on High Sierra? What was done you believe to create this issue?
 
This is why anyone clued with Mac OS X always tries to stay one major OS behind for this very reason.

Does this bug impact any older OS versions? If not, that's lucky.
 
  • Like
Reactions: heffsf
Pretty scary, but easily fixed. I wonder how many people have bothered to actually set their firmware password after reading this. And also consider how likely it is that your Mac will be broken into. I am not worried.

This will not work if the account falls under Parental Controls (while logged into that account). And I cannot get the login screen method to work - this means of "root" access doesn't seem to work on my MBP - maybe because one account is the admin, and one is the Parental Controls account. It has only worked for me if I am already logged into my (admin) account.

And while this is very bad for Apple...understand that computers (regardless of OS) aren't foolproof. But macOS is easily (still) the most secure OS out there. Right out of the box. So set your firmware password, backup your data, and rest easy. This is worse for Apple than it is for users of macOS.

The sky actually isn't falling, Chicken Little. Just set your firmware password.
 
Local access to a corporate workstation isn't that big of an issue if everything is locked out with other logins. Plus those developers are probably working on open source projects so any data stored locally is probably not that important. Not a big deal. Apple shouldn't even prioritize fixing this.

Are you for absolute real?

Wow...so much wrong with your post, its scary. And as for your last sentence - man....you are SO wrong it's unreal.
[doublepost=1511957514][/doublepost]
Hackers broke Face ID a week after iPhone X release. With a cheap silicone mask.

https://www.wired.com/story/hackers-say-broke-face-id-security/

No, they didn't. They demonstrated a proof of concept that they can make a mask that eventually can fool Face ID but they have yet to prove it can work in real life. Ask yourself this; how many attempts did they take to perfect the mask? Also, remember that they at all times had the ability to reset the failed counter back to zero on the phone.

In real life they'd get at most just 5 chances to craft a mask and have it work. On the 6th attempt Face Id is disabled and no amount of re-crafting as mask will help - it's then the passcode or nothing.
 



There appears to be a serious bug in macOS High Sierra that enables the root superuser on a Mac with a blank password and no security check.

The bug, discovered by developer Lemi Ergin, lets anyone log into an admin account using the username "root" with no password. This works when attempting to access an administrator's account on an unlocked Mac, and it also provides access at the login screen of a locked Mac.

rootbug-800x583.jpg

To replicate, follow these steps from any kind of Mac account, admin or guest:

1. Open System Preferences
2. Choose Users & Groups
3. Click the lock to make changes
4. Type "root" in the username field
5. Move the mouse to the Password field and click there, but leave it blank
6. Click unlock, and it should allow you full access to add a new administrator account.

At the login screen, you can also use the root trick to gain access to a Mac after the feature has been enabled in System Preferences. At the login screen, click "Other," and then enter "root" again with no password.

This allows for admin-level access directly from the locked login screen, with the account able to see everything on the computer.

It appears that this bug is present in the current version of macOS High Sierra, 10.13.1, and the macOS 10.13.2 beta that is in testing at the moment. It's not clear how such a significant bug got past Apple, but it's likely this is something that the company will immediately address.

Until the issue is fixed, you can enable a root account with a password to prevent the bug from working. We have a full how to with a complete rundown on the steps available here.

Update: An Apple spokesperson told MacRumors that a fix is in the works:

Article Link: Major macOS High Sierra Bug Allows Full Admin Access Without Password - How to Fix [Updated]
[doublepost=1511957717][/doublepost]This is not just a problem via Users & Groups - if you can see the "Other" user on the Login Window screen then you can enable root that way. I clicked on this, signed-in with root and no password and it set-up root and l was in with full system admin rights. What a nightmare!!!
 
  • Like
Reactions: Skeptical.me
this is starting to be comical for Apple to miss such a security hole for users! WOW

EDIT: root enabled after the 2nd try :mad: ... I used to enable root for all my machines. Have stopped doing it for my last 2 machines. Now kicking myself for doing so :(
 
  • Like
Reactions: heffsf
This is why anyone clued with Mac OS X always tries to stay one major OS behind for this very reason.

Does this bug impact any older OS versions? If not, that's lucky.

Not always true; there was a root escalation bug that could be exploited by a one-line shell script in Yosemite that was fixed in early El-Capitan betas.
[doublepost=1511958044][/doublepost]
Thanks, MacRumors. You've aided all those thieves who grabbed computers from stores as well as private citizens.

Oh, please... This news is everywhere. And I mean EVERYWHERE! Try reading other sources other than MacRumors!
[doublepost=1511958149][/doublepost]
Why is is this just on High Sierra? What was done you believe to create this issue?

From everything I've read, here and on multiple other sites, there have been non reports anywhere of this affecting Sierra or below.

That's usually a good start for making the statement that "This only affects High Sierra"
 
FYI: I had root enabled on my machine but it still worked. I had to "Change Root Password" for it to "fix" the issue.
[doublepost=1511958250][/doublepost]
This is really bad.. I tried to VPN into my mac pro server with root/blank and it worked! Major screw up, this is not just a problem with local access to a machine

Wholly crap! Wow, I'm surprised with this major screw up and the lack of news/write-ups about it.
 
I just couldn't get this vulnerability to show itself, no matter how many times I tried. But then I entered the name "root" and entered my usual admin password and I was in. What does this mean? I don't have a guest user set up.
 
If accountability means anything then someone should be fired for such a stupid mistake.
While I still prefer Apple products and won't consider changing, I have less and less confidence in Apple's design, product management and performance. I have never had confidence in their customer service or willingness to stand behind their products.
 
  • Like
Reactions: heffsf
clarification: you need to select (focus) the password field, but leave it blank

Apologies if this is in the thread but I tried searching and I could not find the answer. Bloomberg tech had a segment on this flaw but they did not fully explain one aspect. They said someone could access your Mac remotely if they were on the same network.

Does that mean on your wifi network or your shared ethernet if you have it shared to other devices but not open to the internet as a whole?
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.