New macOS Security Bug Unlocks App Store With Any Password

New macOS Security Bug Unlocks App Store With Any Password

Back at the tail end of November, Apple had to rush out an emergency security patch after news of a serious security flaw surfaced in macOS High Sierra. That bug allowed users to log into a system by typing “root” for a login, then hitting enter for a login attempt several times in a row. Now there’s a new bug; it isn’t as much of a risk as that one, but it’s still a significant issue.

The bug appears limited to High Sierra (Sierra isn’t affected), and has been verified by Macrumors as existing in 10.13.2, the latest version of the operating system. Macrumors states that it cannot reproduce the error on the beta versions of macOS 10.13.3, suggesting it’ll be fixed in an upcoming release. Nevertheless, it remains active for now.

Reproducing the bug is fairly simple and involves the following steps, as laid out by eholtam, who found the bug:

1) Log in as a local admin2) Open App Store Pref pane from the System Preferences3) Lock the padlock if it is already unlocked4) Click the lock to unlock it5) Enter any bogus password

The expected behavior, obviously, is that the login attempt will fail. The actual behavior is that the login and unlock attempt works perfectly. The bug only works when you’re logged into an administrative account, but it’s another example of how Apple seems to have dropped the ball on setting user policies and permissions properly. While not nearly as risky as the earlier login bug, Apple clearly didn’t perform some due diligence testing it needed to engage in. Being able to change preferences in the App Store allows you to change the schedules for app updates, system updates, and security updates. Flipping those settings could be used in conjunction with another attack to ensure a system wasn’t patched to close a security hole, though local access or at least administrator access from a remote location are required.

The optics of the situation are worse, given that Apple specifically declared it would revisit its practices to prevent a reoccurrence. Back in late November, the company wrote: “We greatly regret this error and we apologize to all Mac users, both for releasing with this vulnerability and for the concern it has caused. Our customers deserve better. We are auditing our development processes to help prevent this from happening again.”

Clearly that audit isn’t quite finished yet. There’s no current workaround to this issue, so the only real option is to wait for Apple to provide a solution.

Continue reading

Protect Your Online Privacy With the 5 Best VPNs
Protect Your Online Privacy With the 5 Best VPNs

Investing in a VPN is a smart choice right now, but the options are vast. To help narrow things down a bit, we've rounded up five of our very favorite consumer services.

RISC-V Tiptoes Towards Mainstream With SiFive Dev Board, High-Performance CPU
RISC-V Tiptoes Towards Mainstream With SiFive Dev Board, High-Performance CPU

RISC V continues to make inroads across the market, this time with a cheaper and more fully-featured test motherboard.

The PlayStation 5 Will Only Be Available Online for Launch Day
The PlayStation 5 Will Only Be Available Online for Launch Day

The PlayStation 5 isn't going to be available in stores on launch day, and if you want to pick up an M.2 SSD to expand its storage, you'll have some time to figure out that purchase.

ARMing for War: New Cortex-A78C Will Challenge x86 in the Laptop Market
ARMing for War: New Cortex-A78C Will Challenge x86 in the Laptop Market

ARM took another step towards challenging x86 in its own right with the debut of the Cortex-A78C this week. The new chip packs up to eight "big" CPU cores and up to an 8MB L3 cache.