- #FIX FOR APPLE OS HIGH SIERRA HACK INSTALL#
- #FIX FOR APPLE OS HIGH SIERRA HACK UPDATE#
- #FIX FOR APPLE OS HIGH SIERRA HACK PATCH#
- #FIX FOR APPLE OS HIGH SIERRA HACK SOFTWARE#
Softwareupdate -i “Security Update 2017-001- “ 2.
#FIX FOR APPLE OS HIGH SIERRA HACK PATCH#
But if you’re applying the patch via Terminal, you need to add a space.
This is not an issue if you are downloading the patch through the App Store. You can read more about this in our article – Apple Rushed Out macOS Root Bug Fix & It Shows… Note : Apple rushed out this update so quickly that they accidentally used a space instead of the version number. If you need to use the root user account, you will need to re-enable it, and change its password, after applying the update. Note : This bug fix will reset and disable the root user account. This update will remove the root bug and improve credential validation.
#FIX FOR APPLE OS HIGH SIERRA HACK INSTALL#
Install macOS Security Update 2017-001 New!Īpple just released Security Update 2017-001. He basically exposed a zero-day vulnerability for hackers to use, while Apple rushes to fix the bug. Unlike other security researchers, Lemi Orhan Ergin did not forewarn Apple before publicly revealing the bug, on Twitter no less. This means the vast majority of Apple computers running on High Sierra are compromised, as the root user account is disabled by default. What’s even more troubling is that the root bug works even with a disabled root user account. Anyone who gains root user privileges using this bug can access (read, copy or move) the files in any user account (even those of an administrator) without knowing the password. It doesn’t matter if you encrypted your computer, and secured it with an extremely long and complex password. The macOS High Sierra root bug is EXTREMELY serious, because it allows a hacker to easily bypass all of the macOS operating system’s security protections. You can log in as root even after the machi was rebooted /fTHZ7nkcUp
#FIX FOR APPLE OS HIGH SIERRA HACK SOFTWARE#
On Tuesday, 28 November 2017, Turkish software developer Lemi Orhan Ergin revealed the macOS High Sierra root bug. Suggested Reading : The Mac Root User Login & Password Guide So this Mac root user account should only remain disabled unless you really, REALLY need to use it. In fact, a Mac root user can use the rm -rf * command to delete the contents of every mounted drive in the computer, until macOS crashes when a crucial file or folder is deleted. In fact, it gives you such God-like powers, you can modify or even delete critical system files. With the Mac root user account, you can even access files in other user accounts. There is a Mac superuser account called “ root” that gives you elevated read and write privileges to hidden or protected areas of the system. However, that is not the highest access level possible. This gives you more privileges and access than a standard user account. If you are the primary user of a MacOS X system, you have an administrator account with administrator privileges. Updated : Added a new section on the Apple bug fix (Security Update 2017-001), and additional information on the root bug.