-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0205
            Apple High Sierra Uses a Passwordless Root Account
                             29 November 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Apple High Sierra
Operating System:     OS X
Impact/Access:        Root Compromise -- Console/Physical
Resolution:           Mitigation
Member content until: Friday, December 29 2017

OVERVIEW

        AusCERT has verified that OS X High Sierra uses a passwordless root
        account.


IMPACT

        "Today, a security researcher twitted about a dangerous behaviour
        he found in the Apple High Sierra operating system: It is possible 
        to get administrator rights (the "root" account on UNIX) by 
        connecting without a password. I was able to reproduce this 
        behaviour on my MacBook running the latest OS X version. It appears
        that OS X is delivered with a passwordless root account."[1]


MITIGATION

        Set a root password as soon as possible:
        To do this in your terminal type, "sudo passwd root" [1]
        To do this via a graphical user interface follow instructions on the
        following link,
        https://9to5mac.com/2017/11/28/how-to-set-root-password/


REFERENCES

        [1] Apple High Sierra Uses a Passwordless Root Account
            https://isc.sans.edu/diary/rss/23077

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+23z
-----END PGP SIGNATURE-----