Apple have just released a patch which will be automatically installed on systems running the latest macOS 10.13 version of the High Sierra operating system. If you are not running this version on your Mac, you should upgrade to it and ensure that the security patch is applied.

The patch, given the CVE ID: CVE-2017-13872, corrects a bug giving anyone with physical access to a computer running the latest version of the operating system admin access simply by putting “root” in the user name field. According to Apple, the bug only affects macOS Sierra 10.13.1, and does not affect macOS Sierra 10.12.6 or earlier.

Unusually, the bug was announced by a developer, Lemi Orhan Ergin, who publicised the flaw on Twitter rather than going through the usual step of advising the software manufacturer (in this case Apple) of the bug, thus allowing them to release a patch before the flaw was announced to the world and thus making the flaw available to malicious users before the patch could be released.

References: Apple Security Update – https://support.apple.com/en-us/HT208315 National Vulnerability Database (NIST, USA) – https://nvd.nist.gov/vuln/search/

Stay safe, Terry Griffin



Feature Articles


Blog
What to look for in a cloud security system and in training?
By Leif Pedersen | 19 February 2024
Blog
Bridging the gap between innovation and safety with AWS security training
By Leif Pedersen | 26 January 2024
eBook
Drive Innovation with IT Service Management Training
11 December 2023
Blog
Unleashing the Power of Data Analytics: A Call for Governments and Public Sector Agencies
By Chloe Villanueva | 20 November 2023