Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

macOS High Sierra Update Patches Keychain Access Flaw

An update released on Thursday by Apple for its macOS High Sierra operating system patches two vulnerabilities, including one that allows malicious applications to steal passwords from the Keychain.

An update released on Thursday by Apple for its macOS High Sierra operating system patches two vulnerabilities, including one that allows malicious applications to steal passwords from the Keychain.

The Keychain flaw, tracked as CVE-2017-7150, was disclosed last week by Patrick Wardle, director of research at Synack. Apple has now addressed the issue with the release of High Sierra 10.13 Supplemental Update.

The researcher warned that High Sierra and previous versions of macOS are affected by a security hole that can be exploited by unsigned applications to programmatically dump and exfiltrate sensitive data from the Keychain, including plaintext passwords. However, he only released a video demonstrating the attack, without making any technical details public.

“A method existed for applications to bypass the keychain access prompt with a synthetic click. This was addressed by requiring the user password when prompting for keychain access,” Apple said in its advisory.

SecurityWeek has reached out to Wardle to find out if the latest update properly patches the vulnerability he found. This article will be updated once the researcher responds.

Wardle also demonstrated recently how Apple’s new Secure Kernel Extension Loading (SKEL) security feature, introduced in High Sierra, can be easily bypassed.

Advertisement. Scroll to continue reading.

The High Sierra 10.13 Supplemental Update also fixes a password disclosure issue involving encrypted Apple File System (APFS) volumes.

Brazil-based developer Matheus Mariano discovered that passwords set by users via Disk Utility for new encrypted APFS volumes are displayed in clear text via the “Show Hint” button when the volume is mounted. The problem only appears to affect encrypted APFS volumes created via Disk Utility.

“This was addressed by clearing hint storage if the hint was the password, and by improving the logic for storing hints,” Apple said about the flaw, which it tracks as CVE-2017-7149.

Apple has also published a knowledge base article for the password leakage issue. The company has advised users to protect their existing APFS volumes by creating a backup, erasing the existing volume, and restoring the initial volume to set a new password.

“Changing the password on an affected volume clears the hint but doesn’t affect the underlying encryption keys that protect the data,” Apple said.

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.