{"id":245,"date":"2017-11-29T15:23:36","date_gmt":"2017-11-29T20:23:36","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=245"},"modified":"2017-11-29T15:23:36","modified_gmt":"2017-11-29T20:23:36","slug":"macos-high-sierra-security-bug","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2017\/11\/29\/macos-high-sierra-security-bug\/","title":{"rendered":"macOS High Sierra Security Bug"},"content":{"rendered":"<p>A serious security vulnerability was discovered with macOS High Sierra that can potentially allow anybody full administrative access without a password. Anyone running macOS High Sierra 10.13, 10.13.1, or 10.13.2 who has not previously enabled the root account or changed a root user account password on his or her Mac before may be affected.<\/p>\n<p>To determine which version of macOS you are using, choose &#8216;About This Mac&#8217; from the Apple Menu and click on the Overview tab.<\/p>\n<p>It is vital that Mac users take immediate steps to secure their systems and prevent unauthorized access.<\/p>\n<p><strong>Apple has released <a href=\"https:\/\/support.apple.com\/en-us\/HT208315\">Security Update 2017-001<\/a> to address the issue.\u00a0 The update should be available through the Updates tab in the Mac App Store.<\/strong><\/p>\n<p>For detailed installation instructions, visit:\u00a0https:\/\/support.apple.com\/en-us\/HT201541<\/p>\n<h2>How to Prevent Root Login Without a Password in macOS High Sierra<\/h2>\n<p>If you cannot immediatly patch your system, there are two other methods available to lock down the Root account.\u00a0One option is to use the Directory Utility and the other is performed on the command line. Choose whichever you feel more comfortable doing, they both accomplish the same task.<\/p>\n<p><strong>Please contact the IT Service Desk at 978 934 4357 should you need assistance with this.<\/strong><\/p>\n<p>Using Directory Utility to Lock Down Root:<br \/>\n1. Open Spotlight on the Mac by hitting Command+Spacebar (or clicking the Spotlight icon in the upper right corner of the menubar) and type in \u201cDirectory Utility\u201d and hit return to launch the app<img src=\"http:\/\/cdn.osxdaily.com\/wp-content\/uploads\/2017\/11\/1-prevent-password-less-root-login-macos-high-sierra-bug-1-610x385.jpg\" alt=\"prevent root password less login bug\" \/><\/p>\n<p>2. Click the little lock icon in the corner and authenticate with an admin account login (in most cases this is the same account you log into your mac with).<\/p>\n<p><img src=\"http:\/\/cdn.osxdaily.com\/wp-content\/uploads\/2017\/11\/2-prevent-password-less-root-login-macos-high-sierra-bug.jpg\" alt=\"prevent root password less login bug\" \/><\/p>\n<p>3. Now pull down the \u201cEdit\u201d menu and choose \u201cChange Root Password\u2026\u201d (see note under step #5 if you don&#8217;t see &#8216;Change Root Password&#8230; in the menu&#8217;) ***<\/p>\n<p><img src=\"http:\/\/cdn.osxdaily.com\/wp-content\/uploads\/2017\/11\/3-prevent-password-less-root-login-macos-high-sierra-bug-3.jpg\" alt=\"prevent root password less login bug\" \/><\/p>\n<p>4. Enter a password for the root user account and confirm, then click \u201cOK\u201d<\/p>\n<p><img src=\"http:\/\/cdn.osxdaily.com\/wp-content\/uploads\/2017\/11\/4-prevent-password-less-root-login-macos-high-sierra-bug-2.jpg\" alt=\"prevent root password less login bug\" \/><\/p>\n<p>5. Close out of Directory Utility<\/p>\n<p>*** If the root user account is not yet enabled, choose \u201cEnable Root User\u201d and then set a password instead.<\/p>\n<p>Essentially all you are doing is assigning a password to the root account, meaning that logging in with root will then require a password as it should. Also, if the root account is disabled, it doesn&#8217;t mean it is secure. The root account must be enabled and have a set password.<\/p>\n<p>Using the Command Line to Assign a Root Password:<br \/>\nUsers who would prefer to use the command line in macOS can also set or assign a root password with sudo and the regular old passwd command.<br \/>\n1. Open the Terminal application, found in \/Applications\/Utilities\/<br \/>\n2. Type the following syntax exactly into the terminal, then hit the return key:<br \/>\nsudo passwd root<br \/>\n3. Enter your admin password to authenticate and hit return<br \/>\n4. At \u201cNew password\u201d, enter a password you won\u2019t forget, hit return, and confirm it<\/p>\n<p><img src=\"http:\/\/cdn.osxdaily.com\/wp-content\/uploads\/2017\/11\/change-root-password-command-line-610x170.jpg\" alt=\"Stop no password root login but in macOS High Sierra from command line\" \/><\/p>\n<p>Be sure to set the root password to something you will remember, or perhaps even matching your admin password. UMass Lowell Information Security recommends a 16 character password for optimal security.<\/p>\n<p>Source: http:\/\/osxdaily.com\/2017\/11\/28\/macos-high-sierra-root-login-without-password-bug\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A serious security vulnerability was discovered with macOS High Sierra that can potentially allow anybody full administrative access without a password. Anyone running macOS High Sierra 10.13, 10.13.1, or 10.13.2 who has not previously enabled the root account or changed &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2017\/11\/29\/macos-high-sierra-security-bug\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":274,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/245"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/274"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":9,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"predecessor-version":[{"id":256,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/245\/revisions\/256"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}