{"id":16673,"date":"2017-11-28T17:42:27","date_gmt":"2017-11-29T01:42:27","guid":{"rendered":"http:\/\/37prime.com\/news\/?p=16673"},"modified":"2017-11-28T20:21:42","modified_gmt":"2017-11-29T04:21:42","slug":"root-access-vulnerability-in-macos-high-sierra","status":"publish","type":"post","link":"https:\/\/37prime.com\/news\/2017\/11\/28\/root-access-vulnerability-in-macos-high-sierra\/","title":{"rendered":"Root Access Vulnerability in macOS High Sierra"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16675\" src=\"http:\/\/37prime.com\/news\/wp-content\/uploads\/2017\/11\/macOS-Change-root-Password-1.png\" alt=\"\" width=\"1920\" height=\"1080\" srcset=\"https:\/\/37prime.com\/news\/wp-content\/uploads\/2017\/11\/macOS-Change-root-Password-1.png 1920w, https:\/\/37prime.com\/news\/wp-content\/uploads\/2017\/11\/macOS-Change-root-Password-1-300x169.png 300w, https:\/\/37prime.com\/news\/wp-content\/uploads\/2017\/11\/macOS-Change-root-Password-1-768x432.png 768w, https:\/\/37prime.com\/news\/wp-content\/uploads\/2017\/11\/macOS-Change-root-Password-1-1024x576.png 1024w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/p>\n<p>As reported by\u00a0<a href=\"https:\/\/www.macrumors.com\/2017\/11\/28\/macos-high-sierra-bug-admin-access\/\" target=\"_blank\" rel=\"noopener\">Juli Clover for MacRumors<\/a> and numerous other sites:<\/p>\n<blockquote><p>The bug, discovered by <a href=\"https:\/\/twitter.com\/lemiorhan\/status\/935578694541770752\">developer Lemi Ergin<\/a>, lets anyone log into an admin account using the username &#8220;root&#8221; with no password. This works when attempting to access an administrator&#8217;s account on an unlocked Mac, and it also provides access at the login screen of a locked Mac.<\/p><\/blockquote>\n<p>We verified that on macOS High Sierra 10.13.1, &#8220;root&#8221; user is enabled by default with blank password. For comparison, OS X El Capitan has &#8220;root&#8221; user disabled by default.<\/p>\n<p>UPDATE:<br \/>\nWe verified that previous versions of macOS\/OS X\/Mac OS X have &#8220;root&#8221; user disabled by default.<\/p>\n<p>This is similar to the enabled-by-default-with-blank-password &#8220;administrator&#8221; accounts in Windows XP.<\/p>\n<p>By having &#8220;root&#8221; user disabled by default, potentially a remote attacker can compromise Macs running macOS High Sierra.<\/p>\n<p>Having said all that, anyone with physical access and the right knowledge can reset local user password.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As reported by\u00a0Juli Clover for MacRumors and numerous other sites: The bug, discovered by developer Lemi Ergin, lets anyone log into an admin account using the username &#8220;root&#8221; with no password. This works when attempting to access an administrator&#8217;s account on an unlocked Mac, and it also provides access at the login screen of a &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/37prime.com\/news\/2017\/11\/28\/root-access-vulnerability-in-macos-high-sierra\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Root Access Vulnerability in macOS High Sierra&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4],"tags":[381,3436,3397,3448,2648,936],"class_list":["post-16673","post","type-post","status-publish","format-standard","hentry","category-news","tag-apple","tag-high-sierra","tag-macos","tag-root","tag-security","tag-tech"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pcNtU-4kV","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts\/16673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/comments?post=16673"}],"version-history":[{"count":3,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts\/16673\/revisions"}],"predecessor-version":[{"id":16679,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts\/16673\/revisions\/16679"}],"wp:attachment":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/media?parent=16673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/categories?post=16673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/tags?post=16673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}