An issue was discovered in certain Apple products. macOS High Sierra before Security Update 2017-001 is affected. The issue involves the "Directory Utility" component. It allows attackers to obtain administrator access without a password via certain interactions involving entry of the root user name.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://objective-see.com/blog/blog_0x24.html | exploit third party advisory technical description |
https://support.apple.com/HT208331 | |
https://support.apple.com/HT208315 | vendor advisory |
https://arstechnica.com/information-technology/2017/11/macos-bug-lets-you-log-in-as-admin-with-no-password-required/ | third party advisory mitigation |
http://www.securitytracker.com/id/1039875 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/43201/ | exploit vdb entry third party advisory |
https://github.com/rapid7/metasploit-framework/pull/9302 | |
https://www.exploit-db.com/exploits/43248/ | exploit |
http://www.securityfocus.com/bid/101981 | vdb entry third party advisory |
https://www.wired.com/story/macos-update-undoes-apple-root-bug-patch/ | press/media coverage third party advisory |