Apple offers workaround to MacOS High Sierra root login security bug | Inquirer Technology

Apple offers workaround to MacOS High Sierra root login security bug

/ 12:20 PM November 29, 2017

Image: INQUIRER.net Stock Photo

The discovery of a major security flaw in Apple’s latest MacOS High Sierra has put many users on high alert. The company quickly responded to the reports with a workaround to prevent unwanted access to Mac computers while they work on a patch.

This security bug allows anyone full access to a Mac running on High Sierra version 10.13.1 (17B48) by simply typing “root” on the User Name portion of the log-in window.

ADVERTISEMENT

Fortunately for other Mac users, the bug does not affect older versions of MacOS.

FEATURED STORIES

According to TechCrunch, Apple quickly issued a statement acknowledging the issue. It also provided a step-by-step guide to turn off root login or apply a password until an update to fix the bug could be released.

Founder of Software Craftsman Turkey Lemi Orhan Ergin first made the issue publicly known through a tweet. He tagged both Apple Support and the main Apple Twitter account to quickly get feedback.

Image: Twitter/@lemiorhan

For the time being, it would be advisable to not leave Macs running on High Sierra unattended.  Alfred Bayle /ra

RELATED STORIES:

Apple ID passwords may be vulnerable to iOS phishing attacks

‘Thoughts of suicide’ to be detected by AI in Facebook posts

ADVERTISEMENT

iPhone X ‘notch’ remover now downloadable from App Store

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TOPICS: root access, security bug
TAGS: root access, security bug

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.