
Yes, you can log into macOS High Sierra’s root account with no password.
In this special “emergency” edition of the podcast cybersecurity veterans Graham Cluley and Carole Theriault discuss the breaking news of a serious Apple macOS bug that allows anyone to log into your Mac with root admin rights, without having to enter a password.
Show notes:
Please check out the show notes for this episode of the podcast on the Smashing Security webpage.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Episode 54, a special bonus podlet of Smashing Security. And I am joined by Carole Theriault. Hello, Carole. Why are we chatting today?
Why are we releasing a podcast on a Wednesday, for goodness sake?
I think this is of interest if you're an Apple user, obviously, because of the security vulnerability, but it's also of interest, I think, if you're a Windows user, because this is a great excuse to feel really, really smug about running Windows rather than Apple Macs.
Lemi or Liman Ergin, he found a colossal security hole in the latest shipping version of macOS, also known as High Sierra 10.13.
What it means is that anyone can log in to a Mac computer and have access to admin rights.
So they're logging in with basically godlike admin rights to the computer without a password. You can just type in your username as root, hit enter a few times, and you get in.
So surely this is only going to impact those that have enabled their root account.
The root account is disabled, but it appears that this vulnerability means that if you type in your username as root, it kind of re-enables the root account, which by default has no password.
And so you get in. It's absolutely—
Just a couple of months ago, there was a security hole which would display users' actual passwords if you clicked on the "Give me the password hint" button.
Imagine you're working in an office, you're lucky enough to have Apple Macs, and you go away for lunch for your lovely tuna sandwich and someone comes by your desk, maybe your arch rival in the office.
Everyone has an arch rival, don't they? A nemesis.
And even if I've locked the computer, they can say, actually, I want to log in as root. Dink, dink, dink, dink, dink. And in they go.
And they've got the rights to do whatever they like. They can change passwords. They can install malware to spy upon you. Any kind of mischief.
Some researchers have already discovered that it is possible. There are scenarios where it is possible to exploit this flaw remotely.
So if, for instance, you've set up your Apple Mac to allow access via VNC or Apple Remote Desktop, people can do this as well.
Furthermore, if you've ever been irritated, you know, when you go into System Preferences and you change some settings on your Mac and it says, oh, you're gonna have to enter an admin username and password and you're like, oh, what's the admin username and password?
Well, worry no longer because all you have to do is type in root as your username and click OK and off you go.
So people are able to basically elevate their permissions on the computer and cause all kinds of mayhem.
So what you should do is you should change your root password, and you could make it completely and utterly random.
And we will put in a link in the show notes where you can go to the Apple support knowledge base article where they tell you how to change the root password.
And the other thing is, of course, Apple is working on a fix. I would imagine that they're going to push it out quite quickly.
And when you see that popping up on your screen, update your Macs because this obviously isn't good enough.
But at the moment, I'm feeling assured that this has not yet been exploited in the wild.
And I'm hoping Apple are going to fix this at double quick time and that everything is going to go back to normal.
All you have to do is type in a username of root and not enter any passwords." So this has been knowledge to some people for a few weeks and they have been using it maybe for good.
Who knows if it's been done for bad as well? Hard to say.
But I do wonder whether if control freak Steve Jobs was still in charge, whether, you know, he would be ripping people to shreds about a bug like this. Yes, wouldn't he?
I doubt he'd be terribly calm and pouring people a nice cup of tea and say, "Oh, these sort of things happen to anybody." Yeah, well, you know, RIP. Well, obviously.
Although I said at the beginning, you know, Windows users can feel smug, I think every company needs to be a little bit careful about bugs like this.
They can creep in all too easily if you're not doing thorough enough quality control, then bugs can appear in your software just like they have in macOS.
So our advice, change your root password, and when Apple push out a patch, apply that patch as soon as you can.
Was that a cat meowing in your background?
Hosts:
Graham Cluley:
Carole Theriault:
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Definitely bad for Apple… but Carole said "All Mac users should update when the fix is out"… well, not me, I'm still on macOS Sierra (10.12.6) so not all macOS users are affected. Actually I have a root password anyway so I'll postpone the panic, acknowledge the chortling and move on.