{"id":13724,"date":"2017-12-10T14:40:04","date_gmt":"2017-12-10T22:40:04","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=13724"},"modified":"2017-12-10T16:17:37","modified_gmt":"2017-12-11T00:17:37","slug":"sb-12-08-2017","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2017\/12\/sb-12-08-2017\/","title":{"rendered":"Security Bits &#8211; 08 December 2017 &#8211; macOS Root Bug, HomeKit Bug, iOS Backup Encryption"},"content":{"rendered":"<h3>Security Medium 1 \u2014 macOS High Sierra Root Bug<\/h3>\n<p>A nasty bug was found in macOS 10.13 High Sierra \u2014 it was possible to cause the root account to become enabled, and to do so with a blank password.<\/p>\n<p>To trigger this bug all you had to do was go into the control panel, click the padlock to un-lock the sensitive settings, change the username to root, enter no password, then hit enter. At this point the authentication would fail, but, the root account would have been made active. Hit enter again, and <code>root<\/code> with a blank password will be accepted as valid. At this point you can do anything in the control panel, no matter how restricted your account is in theory, and, anything you can get full terminal access as <code>root<\/code>.<\/p>\n<p><!--more--><\/p>\n<p>By default this bug requires physical access, but if you enabled screen sharing it can be triggered remotely. Also, if you enable SSH then once the bug has been triggered anyone can get command-line <code>root<\/code> access remote.<\/p>\n<p>Another default setting that compounded this bug was guest access \u2014 you can trigger this bug from the guest account!<\/p>\n<p>When the news broke, Apple were very quick to fix the bug, so, initially, Apple looked to have responded very promptly, but, alas, reporters soon found mentions of the bug in the Apple support forums from weeks back. Personally, I think that should have triggered alarm bells within Apple, and this should have been fixed before it became major news.<\/p>\n<p>Once the news broke Apple responded very quickly, and for only the second time ever, they used their ability to automatically push updates to users automatically. This meant that without any user action, most affected Macs were quickly patched.<\/p>\n<p>That patch was not without some issues though.<\/p>\n<p>Firstly, the current version of High Sierra at the time the news broke was 10.13.1 (and this bug only ever affected High Sierra, never older versions of the OS). If a user was running 10.13.0 when the automated update was applied, and if they then updated to 10.13.1, their computers became vulnerable again! However, just a few days after the quick-fix Apple released 10.13.2, and that has the fix baked in, so if you&#8217;re not sure whether or not you are safe, all you have to do is be sure you&#8217;re on macOS 10.13.2 or later.<\/p>\n<p>Secondly, the quick-fix broke some sharing features. Apple released a support document with instructions for fixing that issue though, and, the issue was also fixed by 10.13.2.<\/p>\n<p>All in all this was a very embarrassing bug for Apple. To their credit they did apologise, and, they announced that they will be auditing their security practices. I would have liked more detail, but that may come later.<\/p>\n<h4>Links<\/h4>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/major-authentication-security-flaw-reported-in-macos-high-sierra\/\">Major Authentication Security Flaw Reported in macOS High Sierra \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/29\/apple-closes-that-big-root-hole-install-this-update-as-soon-as-possible\/\">Apple closes that big root hole \u2013 \u201cInstall this update as soon as possible\u201d \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/apple-says-auditing-development-processes-wake-mac-root-access-flaw\/\">Apple Says It\u2019s Auditing Development Processes in Wake of Mac Root Access Flaw \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/en-us\/HT208317\">Repair file sharing after Security Update 2017&#8211;001 for macOS High Sierra 10.13.1 \u2014 support.apple.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/daringfireball.net\/2017\/11\/high_sierra_root_login_two_weeks_ago\">High Sierra Root Login Bug Was Mentioned on Apple\u2019s Support Forums Two Weeks Ago \u2014 daringfireball.net\/\u2026<\/a><\/li>\n<li><a href=\"http:\/\/www.loopinsight.com\/2017\/11\/30\/high-sierra-root-login-bug-was-known-weeks-ago-if-not-longer-what-should-have-happened\/\">http:\/\/www.loopinsight.com\/2017\/11\/30\/high-sierra-root-login-bug-was-known-weeks-ago-if-not-longer-what-should-have-happened\/ \u2014 www.loopinsight.com\/\u2026<\/a><\/li>\n<li><a href=\"http:\/\/tidbits.com\/article\/17655\">Apple Pushes Updates to Block the Root Vulnerability Bug \u2014 tidbits.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/gadgets\/2017\/12\/updating-macos-can-bring-back-the-nasty-root-security-bug\/\">Updating macOS can bring back the nasty \u201croot\u201d security bug \u2014 arstechnica.com\/\u2026<\/a><\/li>\n<li>Related: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/i-am-root-a-retrospective-on-a-severe-mac-vulnerability\/\">\u201cI Am Root\u201d: A Retrospective on a Severe Mac Vulnerability \u2014 www.intego.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 2 \u2014 Apple fix HomeKit Sharing Bug in iOS 11<\/h3>\n<p>One of the cool features in HomeKit is that you can share access to your devices with others, presumably friends and family.<\/p>\n<p>If you use this feature, and if you upgraded to iOS 11, then your HomeKit devices could have been accessed by anyone, not just the people you intended to share access with. When you bear in mind that there are HomeKit enabled smart door locks and cameras, that starts to sound like a very serious issue indeed!<\/p>\n<p>Thankfully this problem was responsibly disclosed to Apple, to took action to protect users before the researchers published their findings.<\/p>\n<p>Apple&#8217;s initial quick-fix was done on the back-end, so no action was needed by users. A part of that quick-fix was the disabling of some sharing functionality, which seems like a perfectly reasonable trade-off.<\/p>\n<p>Apple have promised a full fix, and restoration of the disabled services next week, so keep an eye out for an iOS update if you&#8217;re affected by this temporary loss of functionality.<\/p>\n<h4>Links<\/h4>\n<ul>\n<li><a href=\"https:\/\/9to5mac.com\/2017\/12\/07\/homekit-vulnerability\/\">Zero-day iOS HomeKit vulnerability allowed remote access to smart accessories including locks, fix rolling out \u2014 9to5mac.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/vulnerability-ios-homekit-allowed-unauthorized-access-smart-locks\">A vulnerability in iOS HomeKit allowed unauthorized access to smart locks \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 3 \u2014 A Subtle Change in iOS Backup Encryption<\/h3>\n<p>If you back up your iOS devices via iTunes, and if you encrypt those backups, then, and only then, are you affected by a subtle change that Apple made to how those backups are encrypted. The change was made as part of the iOS 11 update.<\/p>\n<p>Previously, iTunes backups were encrypted with a completely stand-alone password, and if you lost that password, your backup could never be decrypted.<\/p>\n<p>What has changed is that there are now two ways to decrypt encrypted iTunes backups \u2014 the stand-alone password as before, and, via the iOS device itself assuming you have the devices pass code.<\/p>\n<h4>Links<\/h4>\n<ul>\n<li>A great explanation of the tradeoff Apple made here, and why it probably makes sense over-all \u2014 <a href=\"http:\/\/tidbits.com\/article\/17658\">tidbits.com\/\u2026<\/a><\/li>\n<li>Apple&#8217;s support document on iTunes backup encryption \u2014 <a href=\"https:\/\/support.apple.com\/en-us\/HT205220\">support.apple.com\/\u2026<\/a><\/li>\n<li>Elcomsoft&#8217;s original post out-lining the change that triggered the controversy \u2014 <a href=\"https:\/\/blog.elcomsoft.com\/2017\/11\/ios-11-horror-story-the-rise-and-fall-of-ios-security\/\">blog.elcomsoft.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable Security Updates<\/h3>\n<ul>\n<li>Apple release security updates for all their supported OSes:\n<ul>\n<li><a href=\"https:\/\/support.apple.com\/en-us\/HT208334\">iOS 11.2 \u2014 support.apple.com\/\u2026<\/a>\n<ul>\n<li>Includes a fix for the KRACK WiFi bugs for older iOS devices \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/08\/apple-fills-the-krack-on-iphones-at-last\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/support.apple.com\/en-us\/HT208331\">macOS High Sierra 10.13.2, Security Update 2017&#8211;002 macOS 10.12 Sierra, and Security Update 2017&#8211;005 for Mac OS X El Capitan \u2014 support.apple.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/en-us\/HT208327\">tvOS 11.2 \u2014 support.apple.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/en-us\/HT208325\">watchOS 4.2 \u2014 support.apple.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Microsoft has released an emergency out of band patch for its <em>Malware Protection Engine<\/em> (the brains behind many MS products including <em>Windows Defender<\/em> and <em>Microsoft Security Essentials<\/em>) \u2014 <a href=\"https:\/\/www.theregister.co.uk\/2017\/12\/07\/microsoft_emergency_update_malware_protection_engine_needs_erm_malware_protection\/\">www.theregister.co.uk\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable News<\/h3>\n<ul>\n<li>Facebook begins trialing a messaging app for kids age 6&#8211;12 that&#8217;s designed to give them a safe place online to chat, free from ads, and with explicit parental consent \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/05\/facebook-brings-messenger-to-kids-as-young-as-6\/\">Facebook brings Messenger to kids as young as 6 \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; NY attorney general demands FCC vote on net neutrality set for December 14 be delayed because the public comment process was &#8216;deeply corrupted&#8217; \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/06\/net-neutrality-comments-deeply-corrupted-ny-attorney-general\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; Newly released transcripts form testimony given over the summer shows the US government believe they don&#8217;t even need the approval of the secret FISA courts to compel companies to break encryption \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/07\/us-gov-says-it-can-break-your-encryption-without-a-court-order\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Suggested Reading<\/h3>\n<ul>\n<li>PSAs, Tips &amp; Advice\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/krebsonsecurity.com\/2017\/12\/phishers-are-upping-their-game-so-should-you\/\">Phishers Are Upping Their Game. So Should You \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/everything-google-knows-about-you-and-how-to-search-privately\/\">Everything Google Knows about You (and How to Search Privately) \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/tips\/quick-tip\/iphone-privacy-paranoid-can\/\">iPhone Privacy for the Paranoid: What You Can Do \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/tips\/deep-dive\/what-is-bitcoin\/\">What Is Bitcoin? Here\u2019s the Bitcoin Primer You Need \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Notable Breaches &amp; Privacy Violations\n<ul>\n<li>&#x2b50;&#xfe0f; Imgur breached in 2014, 1.7m poorly hashed passwords stolen (they now hash their password properly) \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/27\/imgur-breached-back-in-2014-wasnt-storing-your-passwords-properly\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.macobserver.com\/news\/ai-type-keyboard-replacement-leaks-data-31-million-users\/\">Ai.Type Keyboard Replacement Leaks Data for 31 Million Users \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/07\/nicehash-cryptomining-exchange-hacked-everythings-gone\/\">NiceHash cryptomining exchange hacked; everything\u2019s gone \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/05\/paypals-tio-networks-breached-pii-of-1-6-million-users-affected\/\">PayPal\u2019s TIO Networks breached; PII of 1.6 million users affected \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Update: <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/08\/uber-disguised-100000-hacker-payoff-as-bug-bounty-claims-reuters\/\">Uber disguised $100,000 hacker payoff as bug bounty, claims Reuters \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>News\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/28\/most-fancy-bear-hacking-targets-werent-warned-by-fbi\/\">Most Fancy Bear hacking targets weren\u2019t warned by FBI \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/30\/snapchat-takes-a-swipe-at-fake-news\/\">Snapchat takes a swipe at fake news \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/01\/coinbase-ordered-to-turn-over-customer-records-to-irs\/\">Coinbase ordered to turn over customer records to IRS \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/04\/proposed-law-would-jail-execs-who-fail-to-report-data-breaches\/\">Proposed law would jail execs who fail to report data breaches \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Opinion &amp; Analysis\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-november-2017\/\">Month in Review: Apple Security in November 2017 \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/arkits-face-tracking-fud\">ARKit face tracking FUD and what you need to know \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li>An interesting take on the US Net Neutrality debate: <a href=\"https:\/\/stratechery.com\/2017\/pro-neutrality-anti-title-ii\/\">Pro-neutrality, Anti-title II \u2014 stratechery.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Propellor Beanie Teritory\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/12\/01\/microsoft-defends-windows-10-against-aslr-criticism\/\">Microsoft defends Windows 10 against ASLR criticism \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Palate Cleansers<\/h3>\n<ul>\n<li>Video of my presentation at the recent HEAnet Conference in Galway, Ireland \u2014 <a href=\"https:\/\/conferences.heanet.ie\/2017\/talk\/72\">DHCP, DNS &amp; IP Address Management \u2014 conferences.heanet.ie\/\u2026<\/a><\/li>\n<li>A stunning 4K video of lighting at 1,000 frames per second \u2014 <a href=\"https:\/\/petapixel.com\/2017\/12\/04\/epic-4k-film-captures-beauty-lightning-1000fps\/\">petapixel.com\/\u2026<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Security Medium 1 \u2014 macOS High Sierra Root Bug A nasty bug was found in macOS 10.13 High Sierra \u2014 it was possible to cause the root account to become enabled, and to do so with a blank password. To trigger this bug all you had to do was go into the control panel, click [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":13191,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[776,2031,126,2033,1104,114,2032,50,569,13],"class_list":["post-13724","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-encryption","tag-high-sierra","tag-ios","tag-ios-backup-encryption","tag-macos","tag-privacy","tag-root","tag-security","tag-security-bits","tag-windows"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2017\/10\/security_bits_logo_300px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=13724"}],"version-history":[{"count":2,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13724\/revisions"}],"predecessor-version":[{"id":13726,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13724\/revisions\/13726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/13191"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=13724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=13724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=13724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}