New macOS Security Bug Unlocks App Store With Any Password
New macOS Security Bug Unlocks App Store With Any Password
Back at the tail end of November, Apple had to rush out an emergency security patch after news of a serious security flaw surfaced in macOS High Sierra. That bug allowed users to log into a system by typing “root” for a login, then hitting enter for a login attempt several times in a row. Now there’s a new bug; it isn’t as much of a risk as that one, but it’s still a significant issue.
The bug appears limited to High Sierra (Sierra isn’t affected), and has been verified by Macrumors as existing in 10.13.2, the latest version of the operating system. Macrumors states that it cannot reproduce the error on the beta versions of macOS 10.13.3, suggesting it’ll be fixed in an upcoming release. Nevertheless, it remains active for now.
Reproducing the bug is fairly simple and involves the following steps, as laid out by eholtam, who found the bug:
1) Log in as a local admin
2) Open App Store Pref pane from the System Preferences
3) Lock the padlock if it is already unlocked
4) Click the lock to unlock it
5) Enter any bogus password
2) Open App Store Pref pane from the System Preferences
3) Lock the padlock if it is already unlocked
4) Click the lock to unlock it
5) Enter any bogus password
The expected behavior, obviously, is that the login attempt will fail. The actual behavior is that the login and unlock attempt works perfectly. The bug only works when you’re logged into an administrative account, but it’s another example of how Apple seems to have dropped the ball on setting user policies and permissions properly. While not nearly as risky as the earlier login bug, Apple clearly didn’t perform some due diligence testing it needed to engage in. Being able to change preferences in the App Store allows you to change the schedules for app updates, system updates, and security updates. Flipping those settings could be used in conjunction with another attack to ensure a system wasn’t patched to close a security hole, though local access or at least administrator access from a remote location are required.
The optics of the situation are worse, given that Apple specifically declared it would revisit its practices to prevent a reoccurrence. Back in late November, the company wrote: “We greatly regret this error and we apologize to all Mac users, both for releasing with this vulnerability and for the concern it has caused. Our customers deserve better. We are auditing our development processes to help prevent this from happening again.”
Clearly that audit isn’t quite finished yet. There’s no current workaround to this issue, so the only real option is to wait for Apple to provide a solution.
Source:- Extreme Tech
Comments
Post a Comment