While Apple scrambles to issue a software fix for a major macOS High Sierra vulnerability,Girlfriend’s Sister [Uncut] astute observers are wondering what took the company so long to react — after all, the problem was known about weeks ago.
It seems that on November 13, a commenter on an Apple developer forum disclosed the very vulnerability that today threw the infosec community into a frenzy. Oh, and it was called out 9 days ago on Twitter as well.
SEE ALSO: How to protect yourself from the massive macOS High Sierra security vulnerabilityAnd just how bad is this security threat? Well, it's not good. Essentially, it gives anyone with access to an unlocked computer the ability to set themselves as the root user — as well as log back in later to the locked computer at a time of their choosing.
To execute the hack, you only needed to go to System Preferences >Users & Groups, then enter "root" as your user name while leaving the password field blank. Try this a few times until you have access. It's that simple. The exploit was first explained by Apple developer chethan177.
Again, chethan177 posted this on November 13. Apple only issued instructions on how to protect yourself against this on November 28.
This Tweet is currently unavailable. It might be loading or has been removed.
This Tweet is currently unavailable. It might be loading or has been removed.
Whether or not anyone tried to responsibly disclose the threat with Apple remains unclear. But the fact that this attack — which in some cases can be performed remotely — was known to some developers weeks before Apple issued a statement about it is sure to turn heads.
Mashablehas reached out to Apple for comment and will update the story as soon as we hear back.
Topics Apple Cybersecurity
Jeanette Epps isn't the only astronaut to be bumped from a missionLady returns sandwich because apparently it wasn't cut equallyNASA's Jeanette Epps won't make history on the Space Station in 2018Google Photos created the most perfect panorama failThe Winklevoss twins may have lost A LOT of money on BitcoinWhy I deleted the Instagram app — and you should think about it tooApple shuttle buses rerouted following suspected attacksApple's upcoming battery update makes the iPhone more like AndroidQuit everything, 'Chicken nugget tasteA government shutdown is unlikely to affect the nation's internetGuy Pearce thinks we're right to be scared by artificial intelligenceDeadpool wished Betty White a happy birthday'Get Out' director Jordan Peele says he's done with the acting gameSomeone had a seizure in VR and nobody knew what to doThe 'chaiOS' bug lets an attacker freeze iPhones with a messageMichael Douglas' sexual harassment accuser tells her side of the storyChinese startup MeltMall released "Odorless Socks," and we tested themThe internet reacts hilariously to Nintendo Labo's cardboard accessoriesAnn Curry 'not surprised' by Matt Lauer's sexual misconduct allegationsTimothée Chalamet was reportedly wrong about contract silencing him on Woody Allen This Year’s Prizewinners Alternative Routes: A Conversation with Lauren Elkin by Claire Tree Time by Sumana Roy Skinning a Cat: On Writer’s Block by The Paris Review The Genealogy of Disaster by Charif Majdalani Jim Jarmusch’s Collages by Lucy Sante Tolstoy’s Uncommon Sense and Common Nonsense by Yiyun Li A Dispatch from Emily Stokes, Editor by Emily Stokes A Philosophical Game: An Interview with Saul Steinberg by Lauren Kane A Holy Terror Dancing with Light: On Jim Harrison by Joy Williams Nocturne Vibes by The Paris Review Redux: Not an After The Ghosts of Sittwe by Thirii Myo Kyaw Myint Redux: Each Train Rips by The Paris Review Fast by Nichole Perkins Take Place by Terry Tempest Williams The Happiest Place on Earth? by Albert Samaha Redux: Sick Fish by The Paris Review Nancy with the Laughing Face by The Paris Review Redux: Chance Progression by The Paris Review
1.9582s , 8201.8515625 kb
Copyright © 2025 Powered by 【Girlfriend’s Sister [Uncut]】,Pursuit Information Network